Mitre-Attack-Matrix
Attack map
A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures.
18 stars
4 watching
7 forks
last commit: over 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,056 |
| A graphical representation of Linux kernel security concepts and their relationships | 1,784 |
| A repository providing threat intelligence data in STIX format for security analysis and automation | 1,765 |
| Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |
| A set of scripts to detect and analyze cyber adversary activity using Bro/Zeek network security monitor | 570 |
| An attack mapping application that visualizes real-time events and pushes them to the front end via websockets. | 80 |
| Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols | 18 |
| An integration tool for Maltego to leverage MISP threat intelligence and the MITRE ATT&CK dataset | 171 |
| Provides Windows log event indicators mapped to MITRE ATT&CK tactic and techniques | 532 |
| Automates adversary emulation and incident response using a framework built on the MITRE ATT&CK model | 5,722 |
| A curated collection of exploit tools and frameworks used in penetration testing and security research. | 334 |
| An implementation of an adversarial example generation method for deep learning segmentation models. | 58 |
| A personal repository of resources and tools for learning about infosec and hacking | 131 |
| A collection of tools and techniques for simulating cyber attacks on computer systems | 19 |