Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure. Learn more →
Attack-control-framework-mappings Alternatives
Similar projects and alternatives to attack-control-framework-mappings
-
-
Stream
Stream - Scalable APIs for Chat, Feeds, Moderation, & Video. Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.
-
-
-
-
-
-
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
-
InfluxDB
InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
-
tram
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
-
caldera_pathfinder
Discontinued Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
-
Threat-Intelligence-telegram
A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.
-
attack-control-framework-mappings discussion
attack-control-framework-mappings reviews and mentions
-
Is there a Mitre Att&ck mapping to NIST Threat Events?
Here's a mapping to 800-53: https://ctid.mitre-engenuity.org/our-work/nist-800-53-control-mappings/
- NIST 800-53 Control Mappings to MITRE ATT&CK. Pretty handy, if you like that sort of thing…
-
What are the most important metrics for measuring cloud and endpoint security?
BlindSPOT: https://blindspotsec.com/ Specific graphic from BlindSPOT: https://blindspotsec.com/wp-content/uploads/2021/04/Failure_Before.jpg How to Measure Anything in Cybersecurity Risk: https://www.amazon.com/dp/B01J4XYM16/ Monte Carlo simulation approach: https://embracethered.com/blog/posts/2020/red-teaming-and-monte-carlo-simulations/ D3FEND: https://d3fend.mitre.org/ ATT&CK mappings: https://github.com/center-for-threat-informed-defense/attack-control-framework-mappings ATT&CK evals: https://attackevals.mitre-engenuity.org/index.html CALDERA: https://github.com/mitre/caldera Offensive Countermeasures: https://www.amazon.com/dp/1974671690/ SPIFFE: https://spiffe.io/ SPIRE: https://github.com/spiffe/spire Zerotier: https://www.zerotier.com/ Zerotier libzt: https://github.com/zerotier/libzt
-
A note from our sponsor - Stream
getstream.io | 15 Jul 2025
Stats
center-for-threat-informed-defense/attack-control-framework-mappings is an open source project licensed under Apache License 2.0 which is an OSI approved license.
The primary programming language of attack-control-framework-mappings is Python.
Popular Comparisons
- attack-control-framework-mappings VS attack-stix-data
- attack-control-framework-mappings VS caldera
- attack-control-framework-mappings VS spire
- attack-control-framework-mappings VS enterpriseattack
- attack-control-framework-mappings VS adversary_emulation_library
- attack-control-framework-mappings VS tram
- attack-control-framework-mappings VS caldera_pathfinder
- attack-control-framework-mappings VS libzt
- attack-control-framework-mappings VS Threat-Intelligence-telegram
- attack-control-framework-mappings VS PrivacyEngCollabSpace