mitre-attack
Here are 25 public repositories matching this topic...
Previous ATT&CK releases as seen at https://attack.mitre.org/resources/previous-versions/
-
Updated
Jul 21, 2020 - HTML
ATT&CK Evaluations website (DEPRECATED)
-
Updated
Apr 30, 2021 - HTML
MITRE ATT&CK visualizations
-
Updated
Jan 28, 2022 - HTML
Script to produce ATT&CK CSV files and MITRE ATT&CK CSV data storage
-
Updated
Sep 6, 2022 - HTML
Elemental - An ATT&CK Threat Library
-
Updated
Dec 8, 2022 - HTML
This tool allows you to prioritize MITRE ATT&CK techniques for your adversaries and collect corresponding NIST SP 800-53 security controls.
-
Updated
Dec 13, 2022 - HTML
ZΓ©nith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, OSCP solution guides, and current cyber ops TTP to assist companies with the ongoing issue of ransomware attacks on their systems. Zenith is designed to source information from open-source intelligence platformsβ¦
-
Updated
Jan 9, 2023 - HTML
Windows Events Attack Samples
-
Updated
Jan 24, 2023 - HTML
A web application assisting network defenders, analysts, and researchers in the process of mapping adversarial behaviors to MITRE ATT&CK, ACSC ISM and NIST 800-53 frameworks.
-
Updated
Feb 3, 2025 - HTML
DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
-
Updated
Apr 7, 2025 - HTML
Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively
-
Updated
Apr 19, 2025 - HTML
Curated CTI investigations and queries
-
Updated
May 17, 2025 - HTML
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
-
Updated
May 22, 2025 - HTML
CVE Threat Intelligence Toolkit is a research-support platform for security analysts. It connects multiple data sources and tools to help reconstruct CVEs, prepare environments, and extract key behaviors using LLMs.
-
Updated
Jul 30, 2025 - HTML
Templates and tools to enable continuous OT security threat modeling
-
Updated
Aug 5, 2025 - HTML
Utilities for MITREβ’ ATT&CK
-
Updated
Sep 21, 2025 - HTML
π Framework ML/DL per analisi avanzata di log di sicurezza e detection di attacchi informatici. Identifica pattern MITRE ATT&CK, valuta l'efficacia delle regole Sigma, e automatizza la threat detection con ensemble di modelli. Dashboard interattive e analisi comportamentali.
-
Updated
Oct 9, 2025 - HTML
π‘οΈ Ever wonder how hackers break into companies? π This interactive platform lets you simulate REAL Active Directory attacks (Password Spray, Kerberoasting, Pass-the-Hash, Golden Ticket) while learning how to DEFEND against them! π | Built to show both sides of the cybersecurity coin πͺ | Attack. Detect. Defend. Learn. Repeat. π
-
Updated
Oct 19, 2025 - HTML
Simulated phishing-to-persistence attack using a fake Adobe updater, with full red team execution and blue team detection analysis.
-
Updated
Oct 27, 2025 - HTML
Improve this page
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."