Portable SIEM detection toolkit with Sigma rules, Sysmon config, and Wazuh custom rules mapped to MITRE ATT&CK.
-
Updated
Apr 17, 2026 - Python
Portable SIEM detection toolkit with Sigma rules, Sysmon config, and Wazuh custom rules mapped to MITRE ATT&CK.
SOC Alert Triage Lab – Simulated SOC alert classification and triage using Python.
Real-time SOC monitoring dashboard with brute-force detection, threat intelligence enrichment, MITRE ATT&CK mapping and incident response workflow.
Command-line (proctitle) classification into MITRE ATT&CK techniques using TF-IDF + Logistic Regression and an LSTM baseline, with a custom token pattern tailored for cyber artifacts (IPs, paths, flags, URLs).
Wireless Zero Trust threat detection and response lab using Python and Scapy, with MITRE ATT&CK mapping and SIEM-style logging.
SOC triage tool to enrich Windows command-line logs with MITRE mapping and analyst context
Behavior-based Linux malware profiler: ptrace syscall tracing → JSONL events → heuristic analysis with IOC extraction & MITRE ATT&CK mapping. No signatures, no hashes
Add a description, image, and links to the mitre-attck topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attck topic, visit your repo's landing page and select "manage topics."