DeTTECT
tram
Our great sponsors
DeTTECT | tram | |
---|---|---|
4 | 3 | |
1,955 | 391 | |
1.9% | 5.9% | |
8.3 | 7.9 | |
13 days ago | 3 months ago | |
SCSS | Jupyter Notebook | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DeTTECT
-
Automated Mapping From Snort/Suricata Rules to MITRE ATT&CK
Look at dett&ct (https://github.com/rabobank-cdc/DeTTECT) and dettectinator (https://github.com/siriussecurity/dettectinator) The latter already has suricata support.
- GitHub - rabobank-cdc/DeTTECT: Detect Tactics, Techniques & Combat Threats
-
Does anyone have experience changing orthodontists during braces treatment?
If you plan to use. https://github.com/rabobank-cdc/DeTTECT
- Tool for MITRE Mapping
tram
-
MITRE ATT&CK Labeled CTI reports
Check out TRAM https://github.com/center-for-threat-informed-defense/tram/
- Tool for MITRE Mapping
-
TRAM: Advancing Research into Automated TTP Identification in Threat Reports.
I think you may be looking at the wrong repo: https://github.com/center-for-threat-informed-defense/tram/issues. Did you read the article? It’s basically about how it was created in 2019 but they’ve just redesigned and reworked it, that’s what the article is about.
What are some alternatives?
caldera - Automated Adversary Emulation Platform
Go-MISPFeedGenerator - Golang implementation of PyMISP-feedgenerator
dettectinator - Dettectinator - The Python library to your DeTT&CT YAML files.
adversary_emulation_library - An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
caldera_pathfinder - Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
attack-control-framework-mappings - 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
tram - Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.