All Projects → mitrecnd.github.io → Similar Projects or Alternatives

358 Open source projects that are alternatives of or similar to mitrecnd.github.io

attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+235.29%)
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+1123.53%)
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+594.12%)
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+18288.24%)
connectors
OpenCTI connectors
Stars: ✭ 135 (+694.12%)
Mutual labels:  cybersecurity, cti, mitre-attack
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+47.06%)
Mutual labels:  cybersecurity, cti, mitre-attack
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (+229.41%)
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+147.06%)
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+3876.47%)
Mutual labels:  cybersecurity, mitre-attack
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (+29.41%)
Mutual labels:  cybersecurity, mitre-attack
cti-stix-elevator
OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Stars: ✭ 42 (+147.06%)
Mutual labels:  cti, cyber-threat-intelligence
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+33800%)
cti-stix2-json-schemas
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Stars: ✭ 75 (+341.18%)
Mutual labels:  cti, cyber-threat-intelligence
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+29.41%)
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+40382.35%)
Mutual labels:  cybersecurity, cti
Adversary emulation library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (+1635.29%)
Mutual labels:  cybersecurity, mitre-attack
stix-icons
stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC
Stars: ✭ 14 (-17.65%)
Mutual labels:  cti, cyber-threat-intelligence
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (+123.53%)
Shuffle
Shuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+2394.12%)
Mutual labels:  cybersecurity, mitre-attack
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+42452.94%)
client-python
OpenCTI Python Client
Stars: ✭ 45 (+164.71%)
Mutual labels:  cybersecurity, cti
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+435.29%)
Mutual labels:  cybersecurity, cti
Attack Scripts
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (+1605.88%)
Mutual labels:  cybersecurity, mitre-attack
Attack Control Framework Mappings
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (+576.47%)
Mutual labels:  cybersecurity, mitre-attack
Attack Navigator
Web app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+5117.65%)
Mutual labels:  cybersecurity, mitre-attack
Opencti
Authors
Stars: ✭ 2,165 (+12635.29%)
Mutual labels:  cybersecurity, cti
cti-pattern-validator
OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators
Stars: ✭ 18 (+5.88%)
Mutual labels:  cti, cyber-threat-intelligence
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+20400%)
Mutual labels:  cybersecurity, cti
Attack Website
MITRE ATT&CK Website
Stars: ✭ 231 (+1258.82%)
Mutual labels:  cybersecurity, mitre-attack
cti-stix-generator
OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Stars: ✭ 27 (+58.82%)
Mutual labels:  cti, cyber-threat-intelligence
SuperLibrary
Information Security Library
Stars: ✭ 60 (+252.94%)
Mutual labels:  cybersecurity
mitre
MITRE package gives you an approach to cybersecurity data sets.
Stars: ✭ 17 (+0%)
Mutual labels:  mitre-shield
kubescape
Kubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+43076.47%)
Mutual labels:  mitre-attack
ictcore
ICTCore: Unified Communications Framework for web developers. Communications APIs for voice calls, SMS messaging, Fax communications and Emails
Stars: ✭ 18 (+5.88%)
Mutual labels:  cti
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+394.12%)
Mutual labels:  cybersecurity
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+2394.12%)
Mutual labels:  cybersecurity
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+5188.24%)
Mutual labels:  cybersecurity
SecurityInterviewGuide
网络信息安全从业者面试指南
Stars: ✭ 791 (+4552.94%)
Mutual labels:  cybersecurity
Practical Malware Analysis
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-5.88%)
Mutual labels:  cybersecurity
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+1158.82%)
Mutual labels:  cybersecurity
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (+629.41%)
Mutual labels:  cybersecurity
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+147.06%)
Mutual labels:  cybersecurity
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+800%)
Mutual labels:  cybersecurity
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (+94.12%)
Mutual labels:  cybersecurity
tutorials
Additional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (+111.76%)
Mutual labels:  cybersecurity
Benny-Edition-CTI-0.97-Zerty-Modification
Modification of BECTI made by zerty for the JMW Arma 3 server
Stars: ✭ 36 (+111.76%)
Mutual labels:  cti
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+611.76%)
Mutual labels:  cybersecurity
honeyku
A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (+229.41%)
Mutual labels:  deception
know your ip
Know Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-5.88%)
Mutual labels:  cybersecurity
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+3876.47%)
Mutual labels:  cybersecurity
MOSP
A collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (+323.53%)
Mutual labels:  cybersecurity
linkedin-employee-scraper
Extract all employees from LinkedIn. Especially useful for companies with thousands of employees.
Stars: ✭ 16 (-5.88%)
Mutual labels:  cybersecurity
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (+82.35%)
Mutual labels:  cybersecurity
ADLES
Automated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (+64.71%)
Mutual labels:  cybersecurity
DecoyMini
🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Stars: ✭ 213 (+1152.94%)
Mutual labels:  deception
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (+105.88%)
Mutual labels:  cybersecurity
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (+94.12%)
Mutual labels:  cybersecurity
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+341.18%)
Mutual labels:  cybersecurity
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (+4135.29%)
Mutual labels:  cybersecurity
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+1676.47%)
Mutual labels:  cybersecurity
1-60 of 358 similar projects