Automated Adversary Emulation Platform
-
Updated
Nov 21, 2024 - Python
Automated Adversary Emulation Platform
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage
A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Library of threat hunts to get any user started!
Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)
A lightweight Python module to interact with the Mitre Att&ck Enterprise dataset.
Receive notifications/alerts on the most recent disclosed CVE's.
Script for analyzing the compliance of your AWS account based on the adversary techniques on the MITRE ATT&CK Iaas Matrix.
Source References for Published CVE & Advisory
Obtain actionable identifiers from MITRE ATT&CK framework based on provided parameters.
Passive Vulnerability Scanner working with Wappalyzer API and MITRE CVE search functionnality.
Caldera for OT Plugin
ttpnav is a Python library that simplifies navigating MITRE ATT&CK data, enabling users to effortlessly retrieve comprehensive information about specific techniques with a single query. It provides details on mitigations, detections, procedure examples, groups, and related software/tools, streamlining cybersecurity analysis.
Writeups from a CTF competition hosted by MITRE that ran from 12/10/2022 - 12/11/2022. Challenges involved cryptography, binary exploitation, reverse engineering, and web exploitation.
Add a description, image, and links to the mitre topic page so that developers can more easily learn about it.
To associate your repository with the mitre topic, visit your repo's landing page and select "manage topics."