Skip to content

Powered By TEKGENX CONSULTING

Netwerk_LABS
  • Home
  • BLUE TEAM
    • MITRE ATT&CK
    • INFOSEC Governance and Regulation
      • NIST
        • IDENTIFY
        • PROTECT
        • DETECT
        • RESPOND
        • RECOVER
      • Risk Management
    • SOC
      • Threat Detection and Incident Response
        • Threat Detection Engineering
        • Threat Hunting
          • Traffic Analysis
        • Splunk
          • Splunk Basics
          • Understanding Log Sources
          • Dashboards and Reports
          • Exploring SPL
          • Incident Handling with Splunk
          • Investigating with Splunk
    • Security+
    • Scripting
      • Bash Scripting
      • Python
      • ZyBER-TOOLS
  • ZyBER-SERIES
    • Wazuh – SIEM and XDR
    • Attack and Defend Active Directory
    • Offensive Testing Enterprise Networks
    • Threat Detection Engineering
    • F5 Local Traffic Manager (LTM)
    • Incident Response and Forensics
    • Red Team Engagements
  • ZyBER-INTEL
  • ZyBER-NEWS
  • Cookie Policy (EU)

MITRE Framework

by Bharath Narayanasamy
This entry is part 8 of 23 in the series Threat Detection Engineering

Views: 28

Table of Contents

Toggle
  • MITRE ATT&CK Navigator
  • MITRE D3FEND
  • MITRE ENGAGE
  • ATT&CK Emulation Plans
  • Cyber Analytics Repository

MITRE ATT&CK Navigator

https://mitre-attack.github.io/attack-navigator

MITRE D3FEND

https://d3fend.mitre.org

MITRE ENGAGE

MITRE Engage

MITRE Engage Matrix

ATT&CK Emulation Plans

https://mitre-engenuity.org

Center of Threat-Informed Defense (CTID)

Cyber Analytics Repository

https://car.mitre.org

Series Navigation<< Practical Threat Hunting using Elastic SIEM: Hunting for StuxbotSOC Tools and Useful Links >>

Share this:

  • Post

Like this:

Like Loading...

Related

Categories MITRE ATT&CK Tags MITRE
GOAD v2 Installation
ELASTIC SIEM: Kibana Query Language (KQL) 
© 2025 Netwerk_LABS •

Powered by TekGenX

%d