A web application assisting network defenders, analysts, and researchers in the process of mapping adversarial behaviors to MITRE ATT&CK, ACSC ISM and NIST 800-53 frameworks.
Other
4
stars
1
forks
source link
Implements searching of usage examples from the full search page. #61
Initial ability to search for usage examples in the database.
Search result card redirects to the technique the search relates too.