mitre-attack
Here are 7 public repositories matching this topic...
🏰 AI-powered Windows security monitoring with conversational AI chat for natural language threat hunting. Features human-in-the-loop actions, YARA malware detection, MITRE ATT&CK mapping, vector search & threat intelligence. React dashboard with real-time updates. 12K+ events/sec. .NET 8, Ollama/OpenAI, Qdrant.
-
Updated
Nov 10, 2025 - C#
A forked version of Atomic YAML instructions and technique dependencies used by ARTiC2 controllers to construct and execute red team atomic test cases from memory
-
Updated
Mar 9, 2021 - C#
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
-
Updated
Jun 22, 2023 - C#
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
-
Updated
Dec 8, 2022 - C#
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
-
Updated
Feb 12, 2023 - C#
Test Blue Team detections without running any attack.
-
Updated
May 2, 2024 - C#
Improve this page
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."