A collection of notebooks built for defensive and offensive operations.
☆77Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for notebooks-forge
Users that are interested in notebooks-forge are comparing it to the libraries listed below
Sorting:
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 2 months ago
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated last month
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- ☆14Mar 9, 2023Updated 2 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Oct 17, 2020Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- Sniffpass will alert on cleartext passwords discovered in HTTP POST requests☆17Oct 30, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆883Nov 17, 2020Updated 5 years ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- Wrap any binary into a cached webserver☆58Apr 5, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- A repository for using windows event forwarding for incident detection and response☆1,299Sep 8, 2025Updated 5 months ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago