Atomic Red TeamSmall and highly portable detection tests based on MITRE's ATT&CK.
Stars: ✭ 5,364 (+792.51%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (-29.45%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-50.92%)
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-51.75%)
AttackdatamapA datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (-56.07%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-89.02%)
nsm-attackMapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (-91.18%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-96.34%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-77.54%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-95.84%)
S2ANS2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (-88.35%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-90.52%)
SIGMA-detection-rulesSet of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (-83.86%)
kubescapeKubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+1121.3%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (-90.68%)
ezEmuSee adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (-85.19%)
security-stack-mappingsThis project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
Stars: ✭ 305 (-49.25%)
ElementalElemental - An ATT&CK Threat Library
Stars: ✭ 241 (-59.9%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (-62.4%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+420.13%)
MalwlessTest Blue Team detections without running any attack.
Stars: ✭ 215 (-64.23%)
Chain ReactorChain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Stars: ✭ 206 (-65.72%)
Litmus testDetecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (-68.39%)
Pcap AttackPCAP Samples for Different Post Exploitation Techniques
Stars: ✭ 175 (-70.88%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-73.04%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-80.87%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-81.36%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-85.52%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+104.49%)
Attack NavigatorWeb app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+47.59%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (+34.78%)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (+22.8%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+22.63%)
Certified Kubernetes Security SpecialistCurated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
Stars: ✭ 691 (+14.98%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+12.48%)
Auditd AttackA Linux Auditd rule set mapped to MITRE's Attack Framework
Stars: ✭ 642 (+6.82%)