Skip to content

attack-flow main Public Latest

Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.

Install from the command line
Learn more about packages
$ docker pull ghcr.io/center-for-threat-informed-defense/attack-flow:main

Recent tagged image versions

  • Published 2 days ago · Digest
    sha256:da125a0dab4a4a5932eaab7207863726e261d701c89e30b565c9226c927db886
    1 Version downloads
  • Published 2 months ago · Digest
    sha256:1f47f27a244f2fcee5a84f7f19d2c82bd8d575a2f6594aae56b32ca1e9371d68
    779 Version downloads
  • Published 6 months ago · Digest
    sha256:9ac403a93a536b7738383c0971270372a759e860f74afb0c20b12e5861fc524e
    1,451 Version downloads
  • Published 6 months ago · Digest
    sha256:e814397af467954a04feaedfa3c20083c1ff219a816464422dfd0386522bfd82
    5 Version downloads
  • Published 6 months ago · Digest
    sha256:cd97ffc1700400b9ff132413ee997ba149aef00eba239ba5eeab3cb9327b05e6
    8 Version downloads

Loading


Last published

2 days ago

Issues

17

Total downloads

10.9K