AttackIQ Logo

AttackIQ

0
Commercial
Visit Website

AttackIQ is a platform that provides breach and attack simulation products for security control validation. The platform emulates adversary tactics, techniques, and procedures, aligned to the MITRE ATT&CK framework, and offers visibility into security program performance with data-driven analysis and mitigation guidance. AttackIQ offers three different products: Enterprise, Ready!, and Flex. Enterprise is a co-managed service for mature security organizations, allowing them to test their controls whenever they want with advanced intelligence. Ready! is a fully managed breach and attack simulation service for small and medium-sized businesses that lack the personnel to run a continuous security validation program. Flex is a test-as-a-service option for organizations that want to run spot checks or ad-hoc testing without a license. The platform aims to help organizations proactively measure the effectiveness of their security controls and fine-tune them to keep up with the evolving threat landscape, ultimately reducing the cost of breaches and improving security operations efficiency

FEATURES

ALTERNATIVES

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

A parsing tool for Yara Scan Service's JSON output file to help maximize benefits and automate parsing of Yara Scan Service results.

Automatically create yara rules based on images embedded in office documents.

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

A StalkPhish Project YARA repository for Phishing Kits zip files.

Python APIs for serializing and de-serializing STIX2 JSON content with higher-level APIs for common tasks.

A summary of the threat modeling posts and final thoughts on the process

RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved