Automated Adversary Emulation Platform
-
Updated
Apr 26, 2024 - Python
Automated Adversary Emulation Platform
Web app that provides basic navigation and annotation of ATT&CK matrices
Cyber Analytics Repository
Scripts and a (future) library to improve users' interactions with the ATT&CK content
MITRE ATT&CK Website
A python module for working with ATT&CK
STIX data representing MITRE ATT&CK
MITRE Caldera™ for OT Plugins & Capabilities
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
A command-line and ruby API of utilities, converters and tools for creating, converting and processing security baseline formats, results and data
InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark
A web application to streamline the development of STIGs from SRGs
ATT&CK Evaluations website (DEPRECATED)
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications
A FUSE interface to the NCBI Sequence Read Archive (SRA)
CARET - A tool for viewing cyber analytic relationships
(WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline
(WIP) An ansible playbook to harden a docker host to the CIS CE Benchmark requirements
ATT&CK Evaluations Website
Add a description, image, and links to the mitre-corporation topic page so that developers can more easily learn about it.
To associate your repository with the mitre-corporation topic, visit your repo's landing page and select "manage topics."