A collection of notebooks built for defensive and offensive operations.
☆77Oct 13, 2020Updated 5 years ago
Alternatives and similar repositories for notebooks-forge
Users that are interested in notebooks-forge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 3 months ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated 2 months ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Open Source Security Events Metadata (OSSEM)☆1,289Feb 27, 2023Updated 3 years ago
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Architecture - design and implementation of the D4 project architecture☆16Jul 3, 2025Updated 8 months ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- ☆34Apr 29, 2021Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Wrap any binary into a cached webserver☆60Apr 5, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆883Nov 17, 2020Updated 5 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 3 months ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- A repository for using windows event forwarding for incident detection and response☆1,302Sep 8, 2025Updated 6 months ago
- ☆13Oct 7, 2019Updated 6 years ago
- An analytical framework for network traffic and behavioral analytics☆455Dec 7, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆132Oct 17, 2020Updated 5 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Jul 26, 2023Updated 2 years ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago