center-for-threat-informed-defense/technique-inference-engine
TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.
The Technique Inference Engine helps cybersecurity analysts predict an adversary's future actions. By inputting previously observed MITRE ATT&CK techniques, it outputs likely next techniques, allowing defenders to build a complete picture of an adversary's potential steps. This tool is designed for cyber defenders and threat intelligence analysts.
No commits in the last 6 months.
Use this if you need to forecast an adversary's next moves based on their past observed behaviors using the MITRE ATT&CK framework.
Not ideal if you are looking for a tool to detect current threats or to perform real-time incident response.
Stars
68
Forks
13
Language
Jupyter Notebook
License
Apache-2.0
Category
Last pushed
Apr 19, 2025
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/center-for-threat-informed-defense/technique-inference-engine"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
nmap/nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
e-m-b-a/emba
EMBA - The firmware security analyzer
ait-testbed/attackbed
The AttackBed is a simulated enterprise network with numerous vulnerabilities. Attacks in this...
ritesh-gupta-git/AI-Powered-Vulnerability-Management
AI-VMF: AI-Powered Vulnerability Management Framework demo (ensemble exploit prediction + risk scoring)
scorpiondefense/cyberweapons
Automated Cyber Offense