CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (-41.72%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (-92.1%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-94.5%)
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-94.59%)
AttackdatamapA datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (-95.08%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-99.09%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-98.77%)
nsm-attackMapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (-99.01%)
CPE-ParserA utility for validating and parsing Common Platform Enumeration (CPE) v2.2 and v2.3 as originally defined by MITRE and maintained by NIST
Stars: ✭ 28 (-99.48%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-99.59%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-97.48%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-99.53%)
cwe-sdk-javascriptA Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC
Stars: ✭ 18 (-99.66%)
S2ANS2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (-98.7%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-98.94%)
mitreMITRE package gives you an approach to cybersecurity data sets.
Stars: ✭ 17 (-99.68%)
SIGMA-detection-rulesSet of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (-98.19%)
kubescapeKubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+36.84%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (-98.96%)
ezEmuSee adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (-98.34%)
cwe-toolA command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.
Stars: ✭ 40 (-99.25%)
security-stack-mappingsThis project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
Stars: ✭ 305 (-94.31%)
ElementalElemental - An ATT&CK Threat Library
Stars: ✭ 241 (-95.51%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (-95.79%)
MalwlessTest Blue Team detections without running any attack.
Stars: ✭ 215 (-95.99%)
Chain ReactorChain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Stars: ✭ 206 (-96.16%)
Litmus testDetecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (-96.46%)
Pcap AttackPCAP Samples for Different Post Exploitation Techniques
Stars: ✭ 175 (-96.74%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-96.98%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-97.86%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-97.91%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-98.38%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (-77.09%)
Attack NavigatorWeb app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (-83.46%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (-84.9%)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (-86.24%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (-86.26%)
Certified Kubernetes Security SpecialistCurated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
Stars: ✭ 691 (-87.12%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (-87.4%)
Auditd AttackA Linux Auditd rule set mapped to MITRE's Attack Framework
Stars: ✭ 642 (-88.03%)
Threathunter PlaybookA Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
Stars: ✭ 2,879 (-46.33%)