Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.
☆36Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Cyber-Adversary-Heatmaps
Users that are interested in Cyber-Adversary-Heatmaps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- Pritunl Access Control System☆10Feb 16, 2023Updated 3 years ago
- ☆26Jun 2, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Real-time Event Correlation platform☆16Jan 30, 2017Updated 9 years ago
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Updated this week
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts …☆28Jul 19, 2012Updated 13 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Apr 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆19Oct 30, 2020Updated 5 years ago
- UI based on react awesome query builder to visualize rule building on rule engine☆29Apr 29, 2022Updated 3 years ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Feb 25, 2024Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated 3 weeks ago
- Elemental - An ATT&CK Threat Library☆319Dec 8, 2022Updated 3 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- ☆541Mar 15, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- ☆18Jun 20, 2023Updated 2 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Jul 23, 2021Updated 4 years ago
- Open Source External Attack Surface Management☆49Apr 6, 2024Updated last year