Test Blue Team detections without running any attack.
Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques
Detecting ATT&CK techniques & tactics for Linux
🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Ex...
A PowerShell-based toolkit and framework consisting of a collection of t...
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Tea...
Set of Maltego transforms to inferface with a MISP Threat Sharing instan...
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
Repository created to share information about tactics, techniques and pr...
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike ...
Pointing cybersecurity teams to thousands of detection rules and offensi...
attack2jira automates the process of standing up a Jira environment that...
See adversary, do adversary: Simple execution of commands for defensive ...
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Wi...