Metadata-Version: 2.1
Name: dettectinator
Version: 1.1.0
Summary: Dettectinator - The Python library to your DeTT&CT YAML files.
Home-page: https://github.com/siriussecurity/dettectinator
Author: Sirius Security
License: GPL3
Project-URL: Documentation, https://github.com/siriussecurity/dettectinator/wiki
Project-URL: Code, https://github.com/siriussecurity/dettectinator
Project-URL: Issue tracker, https://github.com/siriussecurity/dettectinator/issues
Keywords: mitre attack dettect soc threat hunting
Classifier: Development Status :: 5 - Production/Stable
Classifier: Operating System :: OS Independent
Classifier: Topic :: Security
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Programming Language :: Python :: 3.9
Description-Content-Type: text/markdown
License-File: LICENSE

# Dettectinator
Dettectinator - The Python library to your [DeTT&amp;CT](https://github.com/rabobank-cdc/DeTTECT) YAML files.

Dettectinator is built to be included in your SOC automation tooling. It can be included as a Python library or it can be used via the command line.

Dettectinator provides plugins to read detections from your SIEM or EDR and create/update the DeTT&CT YAML file, so that you can use it to visualize your ATT&CK detection coverage in the ATT&CK Navigator.

Currently de CLI is limited to processing detections through these plugins, the library can also be used for processing data sources.

See the [documentation](https://github.com/siriussecurity/dettectinator) for more information on how to use it.
