Open Adversarial Exposure Validation Platform
☆1,655Apr 5, 2026Updated last week
Alternatives and similar repositories for openaev
Users that are interested in openaev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Cyber Threat Intelligence Platform☆9,128Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated last week
- Automated Adversary Emulation Platform☆6,886Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,561Apr 3, 2026Updated last week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,066Mar 10, 2026Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,232Apr 6, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- Collaborative Incident Response platform☆1,465Updated this week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,343Apr 1, 2026Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Nov 5, 2025Updated 5 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,403Updated this week
- IntelOwl: manage your Threat Intelligence at scale☆4,534Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,086May 28, 2025Updated 10 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆861Feb 25, 2026Updated last month
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,896Jul 25, 2025Updated 8 months ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆324Oct 12, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Purple Team Exercise Framework☆776Updated this week
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,150Feb 21, 2026Updated last month
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,821Mar 11, 2026Updated last month
- Open-source security automation platform for teams and AI agents☆3,544Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,292Updated this week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,106Mar 21, 2026Updated 3 weeks ago
- game of active directory☆7,669Mar 12, 2026Updated last month
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Threat-hunting tool for Linux☆1,053Updated this week
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Adversary Emulation Framework☆10,986Updated this week
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆206Nov 23, 2025Updated 4 months ago