A curated collection of defensive resources, templates, and summaries for every technique in the MITRE ATT&CK framework across enterprise, mobile, and ICS domains.
How It Works
You stumble upon a handy set of guides for defending against common cyber tricks, organized neatly by threat type.
You pick the folder for the type of threat you're facing, like enterprise attacks, and see all the specific tricks listed.
Run a simple tool in one folder to instantly create a readable report with details on how attackers do it and how to fight back.
Dive into the included notes on spotting signs, blocking it, and real-world cases to understand the threat deeply.
Fill in the provided outlines to make your own detection rules, hunting checklist, or response steps tailored to your setup.
Now you have clear actions to detect, hunt, and stop that threat, making your world safer from sneaky attacks.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.