Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an alternative way to explore the ATT&CK dataset, mapping relevant Atomic Red Team tests and Sigma rules to their respective technique.
It allows defenders to create custom ATT&CK Techniques and upload Sigma Rules. The ATT&CK dataset was collected via the hunters-forge attackcti Python client. Atomic Red Team tests were imported from the Atomic Red Team GitHub repository. Sigma rules were imported from Sigma’s GitHub rule collection if they contained ATT&CK tags.
This platform was conceived as a capstone project for University of California Berkeley’s Master of Information and Cybersecurity program. We look forward to community feedback for new ideas and improvements.
This instance of Elemental is experimental and not configured for production deployment. Please see Django documentation on configuring a production server.
Features
Installation
$git clone https://github.com/Elemental-attack/Elemental.git
$cd Elemental/elemental
$pip install -r requirements.txt
$python manage.py runserver
$Default Django admin page crendentials: user: elemental | password: berkelium
Also Read – Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company
Screenshots
garak checks if an LLM can be made to fail in a way we don't…
Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration…
ADCFFS is a PowerShell script that can be used to exploit the AD CS container…
Tartufo will, by default, scan the entire history of a git repository for any text…
Loco is strongly inspired by Rails. If you know Rails and Rust, you'll feel at…
A data hoarder’s dream come true: bundle any web page into a single HTML file.…