mapping-mitre-attack-techniques
mukul975/Anthropic-Cybersecurity-Skills
Maps observed adversary behaviors, security alerts, and detection rules to MITRE ATT&CK techniques to quantify detection coverage, expose blind spots, and guide control prioritization when building Navigator layers, tagging Sigma rules, aligning defenses to threat playbooks, or reporting risk.