Here are
61 public repositories
matching this topic...
Small and highly portable detection tests based on MITRE's ATT&CK.
Updated
Aug 12, 2020
PowerShell
Automated Adversary Emulation
Updated
Aug 12, 2020
Python
A repository of sysmon configuration modules
Updated
Jul 31, 2020
PowerShell
Utilities for MITRE™ ATT&CK
Updated
Mar 17, 2020
HTML
Web app that provides basic navigation and annotation of ATT&CK matrices
Updated
Aug 11, 2020
TypeScript
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Updated
Jul 28, 2020
Python
A Linux Auditd rule set mapped to MITRE's Attack Framework
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
An Active Defense and EDR software to empower Blue Teams
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
Updated
Feb 20, 2019
Batchfile
Actionable analytics designed to combat threats
Updated
Jul 8, 2020
Python
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Updated
Nov 8, 2019
PowerShell
Elemental - An ATT&CK Threat Library
Test Blue Team detections without running any attack.
Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Updated
Aug 7, 2020
Python
Detecting ATT&CK techniques & tactics for Linux
Updated
Jun 22, 2020
Roff
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Updated
Jul 29, 2020
Python
A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks.
Updated
Apr 29, 2020
PowerShell
A knowledge base of actionable Incident Response techniques
Updated
Jun 22, 2020
Python
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Updated
Jul 16, 2020
Python
Open Source - Common Findings DataBase (JSON & MD)
Updated
May 21, 2020
JavaScript
attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage
Updated
Jun 5, 2020
Python
Tool to predict attacker groups from the techniques and software used
Updated
May 31, 2020
Python
Sigma2AttackNet - Mapper of Sigma Rules ➡️ MITRE ATT&CK
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Updated
Jul 23, 2020
Python
ATT&CK Evaluations website
Updated
Jul 23, 2020
HTML
Mapping NSM rules to MITRE ATT&CK
Improve this page
Add a description, image, and links to the
mitre-attack
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
mitre-attack
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.