Graph Representation of MITRE ATT&CK's CTI data
-
Updated
Nov 14, 2019 - Python
Graph Representation of MITRE ATT&CK's CTI data
Pull your DS rules and build a ATT&CK matrix
A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS
AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, Pacu.
ARTiC2 Atomics includes Powershell scripts executed with python controllers and loaded with boolang via .NET CLR.
Tool to predict attacker groups from the techniques and software used
CloudDog is a centralized EDR and WAF, it is able to identify and prevent web application attacks, ssh bruteforce and Suspicious shell commands.
A Python CLI utility for quickly converting a list or text file of MITRE ATT&CK technique IDs to a MITRE ATT&CK Navigator layer .JSON file.
Set of Maltego transforms to query the MITRE ATT&CK dataset.
Actionable analytics designed to combat threats
A knowledge base of actionable Incident Response techniques
Python Phishing Framework to simulate Phishing Campaigns
Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way
Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)
Interrelation of APT groups based on their TTPs. Extraction of APT TTP's layers.
This is a mini-malware I developed in Python as a PoC in order to implement techniques I've learned about
CyCAT.org API back-end server including crawlers
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."