A Python script to generate MITRE ATT&CK Navigator layers from TTPs
-
Updated
Jun 12, 2024 - Python
A Python script to generate MITRE ATT&CK Navigator layers from TTPs
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Kubernetes Attack Graph
VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE, CVE, MITRE ATT&CK, PCI DSS, issues import Nmap/Nessus/Burp/OpenVAS/Bugcrowd/Trivy, Jira export, TXT/JSON/MARKDOWN/HTML/PDF report, attachments, automatic changelog, statistics, vulnerability management, bug bounty, pentest reporting, etc..
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
OpenCTI Connectors
Automated Adversary Emulation Platform
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Small and highly portable detection tests based on MITRE's ATT&CK.
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or making a pull request. All feedback for improvements are welcome. thank you.
Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help detect real-world adversary behaviors in their environments.
Web app that provides basic navigation and annotation of ATT&CK matrices
A Tool for Semantic Ranking for Automated Adversarial Technique Annotation in Security Text
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
The Security Automation Toolkit
Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."