Automated Adversary Emulation Platform
-
Updated
Oct 30, 2025 - Python
Automated Adversary Emulation Platform
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Actionable analytics designed to combat threats
A knowledge base of actionable Incident Response techniques
Scripts and a (future) library to improve users' interactions with the ATT&CK content
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
OpenCTI Connectors
Halberd : Multi-Cloud Agentic Attack Tool
Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders in the IT environment. It will establish an Insider Threat TTP Knowledge Base, built upon data collected on insider threat incidents and lessons learned and experience from the ATT&CK knowledge base.
A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage
ATLAS tactics, techniques, and case studies data
🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Sniffing out well-known threat groups
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."