Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/cybersecurityup/mitre-attack-matrix


https://github.com/cybersecurityup/mitre-attack-matrix

Last synced: about 1 month ago
JSON representation

Awesome Lists containing this project

README

        

# Mitre Att&ck Matrix by Joas

## Community Threats

### https://github.com/scythe-io/community-threats

### https://github.com/threat-punter/community-contributions

### https://github.com/MISP/MISP

### https://github.com/MISP/threat-actor-intelligence-server

### https://github.com/MISP/misp-galaxy

### https://github.com/mitre/cti

### https://gist.github.com/MSAdministrator/5d152ef57e4021c4ffa242aa02e0fb37

### https://github.com/Azure/Azure-Sentinel

## Tools and Plugin - Free and Commercial

### https://github.com/guardicore/monkey

### https://github.com/center-for-threat-informed-defense/caldera_pathfinder

### https://github.com/mitre/emu

### https://www.scythe.io/adversary-emulation

### https://github.com/redcanaryco/invoke-atomicredteam

### https://github.com/uber-common/metta

### https://github.com/NextronSystems/APTSimulator

### https://github.com/endgameinc/RTA

### https://www.encripto.no/en/downloads-2/tools/

### https://github.com/TryCatchHCF/DumpsterFire

### https://github.com/jymcheong/AutoTTP

### https://mitre.github.io/unfetter/

### https://github.com/fugawi/mate

### https://github.com/praetorian-inc/purple-team-attack-automation

### https://github.com/splunk/attack_range

### https://github.com/Telefonica/ATTPwn

### https://github.com/mvelazc0/PurpleSharp

### https://github.com/timfrazier1/AdversarySimulation

### https://github.com/redhuntlabs/RedHunt-OS

### https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI

### https://github.com/SadProcessor/SomeStuff/blob/master/PoSh_ATTCK.ps1

### https://github.com/OTRF/ATTACK-Python-Client

### https://github.com/JimmyAstle/Atomic-Parser

### https://www.cobaltstrike.com/

### https://www.immunityinc.com/services/adversary-simulation.html

### https://www.safebreach.com/SafeBreach-Labs-Presenting-New-Hacking-Techniques-and-Adversary-Simulation

### https://simspace.com/products-components/

### https://attackiq.com/platform/#how-firedrill-works

### https://www.picussecurity.com/offensive-manager.html

### https://docs.microsoft.com/pt-br/microsoft-365/security/office-365-security/attack-simulator?view=o365-worldwide

### https://tearsecurity.com/index.html

### https://www.xmcyber.com/why-haxm/

## TTPs Creator

### https://mitre-attack.github.io/attack-navigator

### https://exploitpack.com/

### https://www.metasploit.com/

### https://i.blackhat.com/USA-19/Wednesday/us-19-Nickels-MITRE-ATTACK-The-Play-At-Home-Edition.pdf

### Exemplo
![image](https://user-images.githubusercontent.com/34966120/122246609-1310fd80-ce9d-11eb-9bc5-4b6fdfd63310.png)

### Example 2 - Windows TTP

- Initial Access

- Exploit MS-17-010
- Spear-Phishing

- Execution

- Powershell Scripts
- Windows Command Shell

- Privilege Escalation

- Windows-Exploit-Suggester
- PowerUP
- EOP Exploitation
- WSL Exploitation
- Exploit MS-10-015
- Exploit MS-16-032
- Exploit MS-19-1388

- Defense Evasion

- AV Bypass with Metasploit and Custom Binaries

- https://www.youtube.com/watch?v=GF3yFmerrrc

- Hooked Syscall

- https://www.ired.team/offensive-security/defense-evasion/

- .NET Reflection

- https://www.ired.team/offensive-security/defense-evasion/

- Full DLL Unhooking

- https://www.ired.team/offensive-security/defense-evasion/

- Obfuscated Powershell Script

- https://www.ired.team/offensive-security/defense-evasion/

- Credential Access

- Mimikatz
- Mimidogz
- LLMNR Poisoning
- Pass-the-Hash
- NTLM Brute Force

- Discovery

- Sniffing
- NLBrute
- LLMNR Poisoning
- Detect Sysmon Process
- COM Enumerate

- Lateral Movement

- RDP Hijacking
- DCOM Lateral Movement
- WMI Lateral Movement
- WinRM
- WinRS
- Psexec

- Command and Control

- Trevorfuscation

- https://github.com/CyberSecurityUP/Trevorfuscation

- Covenant and Powershell Empire

- https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/

- Impact

- Data Encrypted

- Ransomware

- https://github.com/leonv024/RAASNet

- Data Exilftration

- DNS

- https://github.com/iagox86/dnscat2
- https://github.com/Arno0x/DNSExfiltrator

- ICMP

- https://github.com/martinoj2009/ICMPExfil

- HTTP

- https://github.com/ytisf/PyExfil

- Resource Hijacking

- Botnet

- https://github.com/malwaredllc/byob

## Mitre Att&ck Information

### https://github.com/CyberSecurityUP/Mitre-Attack-Matrix

### https://attack.mitre.org/

### https://www.youtube.com/channel/UCFEgQOL_n5iyPvwlHy_LADQ

### https://www.anomali.com/pt/resources/what-mitre-attck-is-and-how-it-is-useful

### https://www.mcafee.com/enterprise/en-us/security-awareness/cybersecurity/what-is-mitre-attack-framework.html

### https://medium.com/mitre-attack

### https://medium.com/cycraft/understanding-the-mitre-att-ck-apt29-evaluation-results-f11ef2d4dacd

### https://www.youtube.com/watch?v=wlJElPA0xqY

### https://www.youtube.com/watch?v=_VQYivkXTIY

### https://www.youtube.com/user/jorgeorchilles

### https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations

## My LinkedIn

### https://www.linkedin.com/in/joas-antonio-dos-santos

*XMind - Evaluation Version*