Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for mitre attack ctid
ctid
x
mitre-attack
x
15 search results found
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Attack Flow
⭐
470
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Attack Control Framework Mappings
⭐
427
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Tram
⭐
306
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Attack_to_cve
⭐
181
A methodology for mapping MITRE ATT&CK techniques to vulnerability records to describe the impact of a vulnerability.
Cti Blueprints
⭐
116
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Top Attack Techniques
⭐
99
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
Insider Threat Ttp Kb
⭐
82
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
Attack_to_veris
⭐
59
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Attack Powered Suit
⭐
58
ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, context menus, and ATT&CK Navigator integration.
Sightings_ecosystem
⭐
22
This project aims to fundamentally advance our collective ability to see threat activity across organizational, platform, vendor and geographical boundaries.
Cloud Analytics
⭐
16
Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as well as a blueprint for how others can create and use cloud analytics effectively.
Summiting The Pyramid
⭐
12
Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.
Attack Sync
⭐
9
ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® version updates into their internal systems and processes.
Sensor Mappings To Attack
⭐
5
Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help detect real-world adversary behaviors in their environments.
Related Searches
Python Mitre Attack (41)
Cybersecurity Mitre Attack (33)
Cyber Threat Intelligence Mitre Attack (19)
Security Mitre Attack (19)
Red Team Mitre Attack (17)
Threat Mitre Attack (14)
Cybersecurity Ctid (12)
Mitre Attack Detection Engineering (10)
Cyber Threat Intelligence Ctid (9)
Html Mitre Attack (9)
1-15 of 15 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.