Mitre-Attack-Matrix
Attack map
A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures.
18 stars
4 watching
7 forks
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
mitre/advmlthreatmatrix | A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,050 |
a13xp0p0v/linux-kernel-defence-map | A graphical representation of Linux kernel security concepts and their relationships | 1,774 |
mitre/cti | A repository providing threat intelligence data in STIX format for security analysis and automation | 1,749 |
mitre/brawl-public-game-001 | Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |
mitre-attack/bzar | A set of scripts to detect and analyze cyber adversary activity using Bro/Zeek network security monitor | 565 |
indeedops/shadowbuster | An attack mapping application that visualizes real-time events and pushes them to the front end via websockets. | 79 |
nshalabi/attack-tools | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,012 |
vernamlab/medusa | Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols | 18 |
misp/misp-maltego | An integration tool for Maltego to leverage MISP threat intelligence and the MITRE ATT&CK dataset | 170 |
mdecrevoisier/evtx-to-mitre-attack | Provides Windows log event indicators mapped to MITRE ATT&CK tactic and techniques | 527 |
mitre/caldera | Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,653 |
fuzzysecurity/resource-list | A curated collection of exploit tools and frameworks used in penetration testing and security research. | 332 |
utkuozbulak/adaptive-segmentation-mask-attack | An implementation of an adversarial example generation method for deep learning segmentation models. | 57 |
hamid-k/bookmarks | A personal repository of resources and tools for learning about infosec and hacking | 124 |
martabyte/red-team-ops | A collection of tools and techniques for simulating cyber attacks on computer systems | 19 |