Small and highly portable detection tests based on MITRE's ATT&CK.
-
Updated
Jun 3, 2024 - C
Small and highly portable detection tests based on MITRE's ATT&CK.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
The Security Automation Toolkit
A repository that stores CTI Knowledge-bases in versioned STIX 2.1 Bundles.
Automated Adversary Emulation Platform
Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Tools for analyzing cyber-security reports and extract information
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE, CVE, MITRE ATT&CK, PCI DSS, issues import Nmap/Nessus/Burp/OpenVAS/Bugcrowd/Trivy, Jira export, TXT/JSON/MARKDOWN/HTML/PDF report, attachments, automatic changelog, statistics, vulnerability management, bug bounty, pentest reporting, etc..
Sigma detection rules for hunting with the threathunting-keywords project
OpenCTI Connectors
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
MITRE ATT&CK Website
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Web app that provides basic navigation and annotation of ATT&CK matrices
Kubernetes Attack Graph
Purpleteam scripts simulation & Detection - trigger events for SOC detections
Research of modifying exported function names at runtime (C/C++, Windows)
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."