Open Adversarial Exposure Validation Platform
☆1,629Feb 24, 2026Updated last week
Alternatives and similar repositories for openaev
Users that are interested in openaev are comparing it to the libraries listed below
Sorting:
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆725Feb 14, 2026Updated 2 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,927Jan 20, 2026Updated last month
- Automated Adversary Emulation Platform☆6,781Updated this week
- Mapping of open-source detection rules and atomic tests.☆201Feb 16, 2026Updated 2 weeks ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,205Dec 29, 2025Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,821Nov 3, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,047Feb 16, 2026Updated 2 weeks ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,199Updated this week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 2 weeks ago
- Collaborative Incident Response platform☆1,396Feb 16, 2026Updated 2 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Feb 23, 2026Updated last week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,330Dec 24, 2025Updated 2 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,073May 28, 2025Updated 9 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Nov 5, 2025Updated 3 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆852Mar 5, 2025Updated 11 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,263Updated this week
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆323Oct 12, 2025Updated 4 months ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,778Feb 18, 2026Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Dec 4, 2024Updated last year
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,139Feb 21, 2026Updated last week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,890Jul 25, 2025Updated 7 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,467Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,037Feb 24, 2026Updated last week
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Aug 14, 2025Updated 6 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated 2 weeks ago
- Purple Team Exercise Framework☆768Jan 4, 2024Updated 2 years ago
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆638Aug 4, 2025Updated 6 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated last month
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,472Feb 18, 2026Updated last week
- Digging Deeper....☆3,784Updated this week
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- The open source AI platform for secure enterprise agents.☆3,497Updated this week