Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity mitre attack
cybersecurity
x
mitre-attack
x
34 search results found
Caldera
⭐
4,930
Automated Adversary Emulation Platform
Redteam Tools
⭐
4,019
Tools and Techniques for Red Team / Penetration Testing
Attack Navigator
⭐
1,791
Web app that provides basic navigation and annotation of ATT&CK matrices
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Shuffle
⭐
1,241
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Digital Forensics Guide
⭐
1,232
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Sentinel Attack
⭐
1,038
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Incident Playbook
⭐
907
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
Open Source Security Guide
⭐
795
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Attack Scripts
⭐
556
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Attack Flow
⭐
470
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Attack Website
⭐
440
MITRE ATT&CK Website
Attack Control Framework Mappings
⭐
427
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Mitreattack Python
⭐
322
A python module for working with ATT&CK
Tram
⭐
306
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Connectors
⭐
300
OpenCTI Connectors
Attack_to_cve
⭐
181
A methodology for mapping MITRE ATT&CK techniques to vulnerability records to describe the impact of a vulnerability.
Caldera Ot
⭐
161
MITRE Caldera™ for OT Plugins & Capabilities
Cti Blueprints
⭐
116
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Top Attack Techniques
⭐
99
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
Insider Threat Ttp Kb
⭐
82
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Attack_to_veris
⭐
59
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Engage
⭐
34
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
Cycat Service
⭐
26
CyCAT.org API back-end server including crawlers
Sightings_ecosystem
⭐
22
This project aims to fundamentally advance our collective ability to see threat activity across organizational, platform, vendor and geographical boundaries.
Website
⭐
20
ATT&CK Evaluations Website
Cti Stix Diamond Activity Attack Graph
⭐
17
STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling
Cloud Analytics
⭐
16
Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.
Attckr
⭐
13
⚔️MITRE ATT&CK Machinations in R
Mitrecnd.github.io
⭐
13
MITRE Shield website
Summiting The Pyramid
⭐
12
Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.
Attack Sync
⭐
9
ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® version updates into their internal systems and processes.
Incident Reports
⭐
6
サイバー攻撃被害に係る情報の公開情報まとめ
Atc Mitigation
⭐
5
Actionable analytics designed to combat threats based on MITRE's ATT&CK.
Sensor Mappings To Attack
⭐
5
Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help detect real-world adversary behaviors in their environments.
Related Searches
Python Cybersecurity (910)
Security Cybersecurity (283)
Penetration Testing Cybersecurity (225)
Shell Cybersecurity (138)
Cybersecurity Information Security (138)
Javascript Cybersecurity (113)
Html Cybersecurity (106)
Security Tools Cybersecurity (102)
Cybersecurity Red Team (91)
Attack Cybersecurity (81)
1-34 of 34 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.