OpenCTI Connectors
-
Updated
May 26, 2024 - Python
OpenCTI Connectors
VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE, CVE, MITRE ATT&CK, PCI DSS, issues import Nmap/Nessus/Burp/OpenVAS/Bugcrowd/Trivy, Jira export, TXT/JSON/MARKDOWN/HTML/PDF report, attachments, automatic changelog, statistics, vulnerability management, bug bounty, pentest reporting, etc..
Obtain actionable identifiers from MITRE ATT&CK framework based on provided parameters.
A repository that stores CTI Knowledge-bases in versioned STIX 2.1 Bundles.
Automated Adversary Emulation Platform
Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Windows network host hunting at scale!
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
Utilities for MITRE™ ATT&CK
ttpnav is a Python library that simplifies navigating MITRE ATT&CK data, enabling users to effortlessly retrieve comprehensive information about specific techniques with a single query. It provides details on mitigations, detections, procedure examples, groups, and related software/tools, streamlining cybersecurity analysis.
Kubernetes Attack Graph
Small and highly portable detection tests based on MITRE's ATT&CK.
MITRE ATT&CK Website
The Security Automation Toolkit
SysFlow documentation and issues tracker
Welcome to the Malware Analysis Toolkit repository, your comprehensive resource for dissecting and understanding the intricate world of malware. This repository is dedicated to providing in-depth technical analysis of various malware strains, equipping security professionals, researchers, and enthusiasts with the knowledge
Tools for analyzing cyber-security reports and extract information
Web app that provides basic navigation and annotation of ATT&CK matrices
Sigma detection rules for hunting with the threathunting-keywords project
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."