MITRE ATT&CK® Logo

MITRE ATT&CK®

0
Free
Visit Website

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge.

FEATURES

ALTERNATIVES

Automatically curate open-source Yara rules and run scans with YAYA.

VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

Repository of Yara signatures for detecting targeted attacks on civil society organizations

A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.

Sample detection rules and dashboards for Google Security Operations

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

PINNED