-
Updated
Mar 23, 2022 - PowerShell
#
mitre-attack
Here are 130 public repositories matching this topic...
Small and highly portable detection tests based on MITRE's ATT&CK.
feature
New feature or request
good first issue
Good for newcomers
open for contribution
Feature/bug fix that we are happy to hand out to anyone who would like to contribute
Automated Adversary Emulation Platform
hacking
cybersecurity
mitre
red-team
security-automation
security-testing
mitre-attack
adversary-emulation
caldera
mitre-corporation
-
Updated
Mar 23, 2022 - Python
kingk789
commented
Feb 3, 2020
I was wondering the benefit of using Modular File Management vs Single Config File Management? Why do you consider it easier to use multiple files and then compile? Trying to figure out what the best case is for my use case. Thanks. #
Windows Events Attack Samples
-
Updated
Feb 19, 2022 - HTML
Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
kubernetes
security
policy
pod
certification
seccomp
apparmor
falco
exam-objectives
mitre-attack
open-policy-agent
kernel-hardening
kube-bench
pod-security-policy
cks
kubernetes-security
trivy
kube-hunter
ckss
os-footprint
-
Updated
Mar 3, 2022 - AGS Script
Web app that provides basic navigation and annotation of ATT&CK matrices
-
Updated
Mar 4, 2022 - TypeScript
An Active Defense and EDR software to empower Blue Teams
-
Updated
Feb 23, 2022 - C++
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
-
Updated
Nov 18, 2021
Utilities for MITRE™ ATT&CK
-
Updated
Dec 1, 2020 - HTML
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
catalog
incident-response
playbook
cybersecurity
mitre
incident-management
incidents
contributions-welcome
mitre-attack
contributors-welcome
cybersecurity-playbook
-
Updated
Dec 6, 2021
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
azure
detection
logging
cybersecurity
sysmon
threat-hunting
siem
security-tools
blue-team
mitre-attack
workbooks
sysmon-config
terraform-azure
kql
azure-sentinel
-
Updated
Apr 27, 2021 - HCL
aws
security
cloud-security
mitre-attack
adversary-emulation
threat-detection
purple-team
detection-engineering
cloud-native-security
-
Updated
Mar 21, 2022 - Go
Actionable analytics designed to combat threats
-
Updated
Jan 27, 2022 - Python
A Linux Auditd rule set mapped to MITRE's Attack Framework
-
Updated
Jul 8, 2020
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
security
integrations
automation
discord
openapi
orchestration
cybersecurity
shuffle
agplv3
hacktoberfest
orchestrator
security-automation
soar
orchestrator-gui
workflow-editor
mitre-attack
security-orchestrator
-
Updated
Mar 20, 2022 - JavaScript
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
cybersecurity
red-team
ctid
mitre-attack
adversary-emulation
cyber-threat-intelligence
threat-informed-defense
-
Updated
Feb 1, 2022 - C
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
graylog
logging
dfir
sysmon
threat-hunting
threat-sharing
threatintel
netsec
sysinternals
graylog-plugin
threat-analysis
threat-intelligence
mitre-attack
-
Updated
Feb 20, 2019 - Batchfile
Scripts and a (future) library to improve users' interactions with the ATT&CK content
-
Updated
Oct 18, 2021 - Python
A knowledge base of actionable Incident Response techniques
-
Updated
Dec 23, 2021 - Python
MITRE ATT&CK Website
-
Updated
Mar 23, 2022 - Python
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
-
Updated
Nov 3, 2020 - PowerShell
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
cybersecurity
cti
risk-management
nist800-53
ctid
mitre-attack
cyber-threat-intelligence
security-controls
threat-informed-defense
-
Updated
Mar 8, 2022 - Python
Elemental - An ATT&CK Threat Library
-
Updated
Feb 10, 2022 - HTML
PCAP Samples for Different Post Exploitation Techniques
-
Updated
Apr 29, 2021
Test Blue Team detections without running any attack.
-
Updated
Oct 11, 2021 - C#
Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
-
Updated
Feb 3, 2022 - C
Detecting ATT&CK techniques & tactics for Linux
incident-response
red-team
blue-team
mitre-attack
defensive-security
security-operations
threathunting
linux-hunting
-
Updated
Oct 1, 2020 - Roff
VULNRΞPO - Free vulnerability report generator and repository end-to-end encrypted. Complete templates of issues, CWE, CVE, MITRE ATT&CK, PCI DSS, AES encryption, Nmap/Nessus/Burp/OpenVAS issues import, Jira export, TXT/HTML/PDF report, attachments, automatic changelog, statistics, vulnerability management, Security report builder.
security
angular
nmap
pci-dss
pentesting
bugbounty
attachments
cve
nessus
openvas
vulnerability-management
vulnerability-assessment
cwe
burpsuite
end-to-end-encryption
vulnerability-report
vulnerability-research
mitre-attack
security-tool
security-team
vulnr-po
-
Updated
Feb 26, 2022 - TypeScript
ATT&CK Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
-
Updated
Mar 21, 2022 - Vue
Improve this page
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."
For example;
% RISK-SCORE==0%then make text colorgreen% RISK-SCORE>=30%then make text coloryellow% RISK-SCORE>=70%then make text colorred% RISK-SCORE==100%then make background colorred% RISK-SCORE==100%then make background colorred% RISK-SCORE==skippedthen make _backg