Cyb3rWard0g / docker-caldera
Docker Container to deploy Mitre Caldera Automated Adversary Emulation System
☆25Updated 4 years ago
Alternatives and similar repositories for docker-caldera:
Users that are interested in docker-caldera are comparing it to the libraries listed below
- OSSEM Modular☆27Updated 4 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- incident response scripts☆19Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆16Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- Mass Triage Tools☆20Updated 2 weeks ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ☆12Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- ☆30Updated 6 years ago
- ☆41Updated 11 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Site for IWS book content☆18Updated 6 years ago
- DeTT&CT Editor☆12Updated 2 months ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Updated 4 years ago
- A list of Mitre Caldera compatible emulation-plans☆14Updated 4 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- ☆11Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year