All Projects → target → attack-navigator-docker

target / attack-navigator-docker

Licence: MIT license
A simple Docker container that serves the MITRE ATT&CK Navigator web app

Programming Languages

Makefile
30231 projects
shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to attack-navigator-docker

camera.ui
NVR like user Interface for RTSP capable cameras
Stars: ✭ 99 (+395%)
Mutual labels:  detection
mmrazor
OpenMMLab Model Compression Toolbox and Benchmark.
Stars: ✭ 644 (+3120%)
Mutual labels:  detection
FCOS.Pytorch
fcos implementation in pytorch1.x
Stars: ✭ 84 (+320%)
Mutual labels:  detection
farm-animal-tracking
Farm Animal Tracking (FAT)
Stars: ✭ 19 (-5%)
Mutual labels:  detection
detection
Detection in the form of Yara, Snort and ClamAV signatures.
Stars: ✭ 70 (+250%)
Mutual labels:  detection
MonoRUn
[CVPR'21] MonoRUn: Monocular 3D Object Detection by Reconstruction and Uncertainty Propagation
Stars: ✭ 85 (+325%)
Mutual labels:  detection
yolov5-deepsort-tensorrt
A c++ implementation of yolov5 and deepsort
Stars: ✭ 207 (+935%)
Mutual labels:  detection
jeelizPupillometry
Real-time pupillometry in the web browser using a 4K webcam video feed processed by this WebGL/Javascript library. 2 demo experiments are included.
Stars: ✭ 78 (+290%)
Mutual labels:  detection
Caffe2-yolo-v3
A Caffe2 implementation of the YOLO v3 object detection algorithm
Stars: ✭ 32 (+60%)
Mutual labels:  detection
EVTX-ETW-Resources
Event Tracing For Windows (ETW) Resources
Stars: ✭ 142 (+610%)
Mutual labels:  detection
Automata
Automatic detection engineering technical state compliance
Stars: ✭ 33 (+65%)
Mutual labels:  detection
clap-detection
Simple clap rhythm detection on Raspberry Pi using Csound and Python. Toy example.
Stars: ✭ 29 (+45%)
Mutual labels:  detection
Mask-YOLO
Inspired from Mask R-CNN to build a multi-task learning, two-branch architecture: one branch based on YOLOv2 for object detection, the other branch for instance segmentation. Simply tested on Rice and Shapes. MobileNet supported.
Stars: ✭ 100 (+400%)
Mutual labels:  detection
LSCDetection
Data Sets and Models for Evaluation of Lexical Semantic Change Detection
Stars: ✭ 17 (-15%)
Mutual labels:  detection
TiEtwAgent
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
Stars: ✭ 135 (+575%)
Mutual labels:  detection
eewids
Easily Expandable Wireless Intrusion Detection System
Stars: ✭ 25 (+25%)
Mutual labels:  detection
AutoLabelImg
A self automatically labeling tool
Stars: ✭ 67 (+235%)
Mutual labels:  detection
Comet.Box
Collection of Object Detection and Segmentation Pipelines🛸🚀
Stars: ✭ 24 (+20%)
Mutual labels:  detection
volkscv
A Python toolbox for computer vision research and project
Stars: ✭ 58 (+190%)
Mutual labels:  detection
GapFlyt
GapFlyt: Active Vision Based Minimalist Structure-less Gap Detection For Quadrotor Flight
Stars: ✭ 30 (+50%)
Mutual labels:  detection

attack-navigator-docker

A simple Docker container that serves the MITRE ATT&CK Navigator web app

Target’s CFC-Open-Source Slack

Prerequisites

You really just need Docker and an Internet connection.

Building

First, check out the code:

git clone --recurse-submodules https://github.com/target/attack-navigator-docker.git

Now just change directory into the repo and run make:

cd attack-navigator-docker
make

The Build Process Explained

By default, the Makefile will pull down docker containers for nginx (which is the base of the final image we build) and node, which is used during the build process. It will also update the MITRE ATT&CK Navigator app's repo, which we include here as a submodule. Thus, whenever you build, you'll get the latest published version of the app.

Once the images are staged and the app code updated, we run an ephemeral copy of the node container, in which we mount and build the app. The container is automatically deleted at the end of the run, but it leaves the compiled app in attack-navigator/nav-app/dist.

Next, we call docker build with a very simple Dockerfile that just creates an nginx container with the app code copied into the web content directory. That's really all that's necessary to get this app running in Docker.

NOTE: The copy you just built with the makefile will be tagged as ":dev". You can manually tag it with something else if you like (e.g., ":latest").

Running the Container

You have two options. First, you can change directory into the repo and just run make run to start up the container with the most common options. Then just point your browser to http://localhost:80 to access the Navigator. This will run the image version tagged as ":dev", which is typically the last version you built.

Alternatively, if you're Docker friendly, you can run the container manually:

docker run -it -p 80:80 --name attacknav davidjbianco/attacknav:dev

As written, this is the same command the the Makefile uses to start the container, but this way you have the option to specify the exact Docker options you want.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].