vincenzocaputo / obsidian-mitre-attack
Parse MITRE ATT&CK to markdown for Obsidian
☆24Updated 5 months ago
Alternatives and similar repositories for obsidian-mitre-attack:
Users that are interested in obsidian-mitre-attack are comparing it to the libraries listed below
- Intelligence Architecture Mind Map☆127Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆159Updated last week
- ☆87Updated last month
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆235Updated 2 weeks ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- User Feedback Space of #MitreAssistant☆37Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆163Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆108Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆91Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆85Updated 5 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆101Updated 5 months ago
- A curated list of KAPE-related resources☆164Updated 2 weeks ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆221Updated 2 weeks ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆110Updated 4 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- SANS #CTI Summit 2025☆13Updated 2 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆110Updated 2 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆146Updated last month
- MISP Playbooks☆189Updated last month
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆68Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- ☆24Updated 4 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆125Updated 8 months ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆17Updated 7 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆14Updated this week