enterpriseattack
A lightweight Python module to interact with the Mitre Att&ck Enterprise dataset. (by xakepnz)
attack-control-framework-mappings
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive. (by center-for-threat-informed-defense)
enterpriseattack | attack-control-framework-mappings | |
---|---|---|
1 | 3 | |
9 | 465 | |
- | - | |
2.7 | 4.6 | |
about 1 month ago | about 1 month ago | |
Python | Python | |
MIT License | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
enterpriseattack
Posts with mentions or reviews of enterpriseattack.
We have used some of these posts to build our list of alternatives
and similar projects.
attack-control-framework-mappings
Posts with mentions or reviews of attack-control-framework-mappings.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-09-06.
-
Is there a Mitre Att&ck mapping to NIST Threat Events?
Here's a mapping to 800-53: https://ctid.mitre-engenuity.org/our-work/nist-800-53-control-mappings/
- NIST 800-53 Control Mappings to MITRE ATT&CK. Pretty handy, if you like that sort of thing…
-
What are the most important metrics for measuring cloud and endpoint security?
BlindSPOT: https://blindspotsec.com/ Specific graphic from BlindSPOT: https://blindspotsec.com/wp-content/uploads/2021/04/Failure_Before.jpg How to Measure Anything in Cybersecurity Risk: https://www.amazon.com/dp/B01J4XYM16/ Monte Carlo simulation approach: https://embracethered.com/blog/posts/2020/red-teaming-and-monte-carlo-simulations/ D3FEND: https://d3fend.mitre.org/ ATT&CK mappings: https://github.com/center-for-threat-informed-defense/attack-control-framework-mappings ATT&CK evals: https://attackevals.mitre-engenuity.org/index.html CALDERA: https://github.com/mitre/caldera Offensive Countermeasures: https://www.amazon.com/dp/1974671690/ SPIFFE: https://spiffe.io/ SPIRE: https://github.com/spiffe/spire Zerotier: https://www.zerotier.com/ Zerotier libzt: https://github.com/zerotier/libzt
What are some alternatives?
When comparing enterpriseattack and attack-control-framework-mappings you can also consider the following projects:
CyberSecurityAuditScript - Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
caldera - Automated Adversary Emulation Platform