A collection of notebooks built for defensive and offensive operations.
☆77Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for notebooks-forge
Users that are interested in notebooks-forge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 3 months ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆331Jan 9, 2026Updated 3 months ago
- Re-play Security Events☆1,734Mar 20, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Open Source Security Events Metadata (OSSEM)☆1,289Feb 27, 2023Updated 3 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- ☆34Apr 29, 2021Updated 4 years ago
- Wrap any binary into a cached webserver☆60Apr 5, 2022Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 3 months ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- A repository for using windows event forwarding for incident detection and response☆1,310Sep 8, 2025Updated 7 months ago
- ☆13Oct 7, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆133Oct 17, 2020Updated 5 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,176Jul 26, 2023Updated 2 years ago
- Online hash checker for Virustotal and other services☆847Mar 21, 2025Updated last year
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago