Automated Adversary Emulation Platform
-
Updated
May 9, 2024 - Python
Automated Adversary Emulation Platform
Web app that provides basic navigation and annotation of ATT&CK matrices
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
InSpec profile to validate the secure configuration of Ubuntu 20.04, against DISA's Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide (STIG) Version 1, Release 6.
MITRE ATT&CK Website
A python module for working with ATT&CK
STIX data representing MITRE ATT&CK
InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
GitHub Action for SAF CLI
ATT&CK Evaluations Website
An aircraft and control model for Flight Deck Interval Management MOPS testing by RTCA SC-186 members.
A web application to streamline the development of STIGs from SRGs
Cyber Analytics Repository
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
A helm chart for MITRE SAF Vulcan
Ansible role for Red Hat 7 STIG Baseline
Inspec Profile to validate MSSQL 2014
Inspec Profile to validate MSSQL Database 2014
Powerful XML<->JSON JavaScript mapping library.
Add a description, image, and links to the mitre-corporation topic page so that developers can more easily learn about it.
To associate your repository with the mitre-corporation topic, visit your repo's landing page and select "manage topics."