ElementalElemental - An ATT&CK Threat Library
Stars: ✭ 241 (-20.98%)
Atc ReactA knowledge base of actionable Incident Response techniques
Stars: ✭ 226 (-25.9%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+924.92%)
MalwlessTest Blue Team detections without running any attack.
Stars: ✭ 215 (-29.51%)
Chain ReactorChain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Stars: ✭ 206 (-32.46%)
Litmus testDetecting ATT&CK techniques & tactics for Linux
Stars: ✭ 190 (-37.7%)
Pcap AttackPCAP Samples for Different Post Exploitation Techniques
Stars: ✭ 175 (-42.62%)
Invoke ApexA PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Stars: ✭ 162 (-46.89%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (-62.3%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-63.28%)
Atomic Red Team Intelligence C2ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-71.48%)
Sysmon ModularA repository of sysmon configuration modules
Stars: ✭ 1,229 (+302.95%)
Attack NavigatorWeb app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+190.82%)
Attack ToolsUtilities for MITRE™ ATT&CK
Stars: ✭ 810 (+165.57%)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (+141.97%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (+141.64%)
Certified Kubernetes Security SpecialistCurated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
Stars: ✭ 691 (+126.56%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+121.64%)
Auditd AttackA Linux Auditd rule set mapped to MITRE's Attack Framework
Stars: ✭ 642 (+110.49%)
Atomic Red TeamSmall and highly portable detection tests based on MITRE's ATT&CK.
Stars: ✭ 5,364 (+1658.69%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+39.02%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (-3.28%)
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-4.92%)
AttackdatamapA datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (-13.44%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-78.36%)
nsm-attackMapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (-82.62%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-92.79%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-55.74%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-91.8%)
S2ANS2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (-77.05%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-81.31%)
SIGMA-detection-rulesSet of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (-68.2%)
kubescapeKubescape is a K8s open-source tool providing a multi-cloud K8s single pane of glass, including risk analysis, security compliance, RBAC visualizer and image vulnerabilities scanning.
Stars: ✭ 7,340 (+2306.56%)
attack to verisThe principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (-81.64%)
ezEmuSee adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (-70.82%)