kubescape 是一个用于k8s风险分析、安全合规性、RBAC 可视化工具和图像漏洞扫描工具。
Small and highly portable detection tests based on MITRE's ATT&CK.
翻译 - 基于MITRE的ATT&CK的小型便携式检测测试。
Automated Adversary Emulation Platform
翻译 - 自动化对手仿真
Windows Events Attack Samples
翻译 - Windows 事件攻击示例
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
翻译 - ☁️ :zap:云的粒度、可操作的对手仿真。
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
翻译 - 一个开放的对手仿真计划库,旨在使组织能够根据现实世界的TTP测试其防御。
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
翻译 - 事件响应流程和手册 |目标:将剧本映射到 MITRE 攻击技术
An Active Defense and EDR software to empower Blue Teams
翻译 - 主动防御和EDR软件可增强Blue Teams的能力
Utilities for MITRE™ ATT&CK
翻译 - MITER™ATT&CK的实用程序
Tool for building Kubernetes attack paths
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
翻译 - 安全控制框架到MITER ATT&CK的映射为组织提供了至关重要的资源,以评估其针对实际威胁的安全控制范围,并为将基于ATT&CK的威胁信息集成到风险管理流程中提供了桥梁。
Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
翻译 - Chain Reactor是一个开放源代码框架,用于编写可在Linux端点上模拟对手行为和技术的可执行文件。
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
翻译 - 适用于macOS的JSON数据集已映射到MITER ATT&CK策略。
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
翻译 - 查看对手,做对手:简单地执行防御性调整/研究的命令(现在有更多ELF可用)