ait-testbed / attackmateLinks
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
☆36Updated 2 weeks ago
Alternatives and similar repositories for attackmate
Users that are interested in attackmate are comparing it to the libraries listed below
Sorting:
- yara detection rules for hunting with the threathunting-keywords project☆121Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 8 months ago
- An Adaptive Misuse Detection System☆40Updated 7 months ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆34Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆81Updated 2 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆53Updated 2 months ago
- Living off the False Positive!☆37Updated 4 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆43Updated 2 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated 2 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- Automate your SOC with SEKOIA.IO's Automation Library. Pull Requests are always welcome and highly appreciated!☆16Updated this week
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated 2 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆38Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A MITRE Caldera plugin☆43Updated 6 months ago
- pySigma Elasticsearch backend☆53Updated last week
- ☆63Updated this week
- PowerShell Script Analyzer☆68Updated last year
- Simple C2 using GitHub repository as comms channel.☆31Updated 7 months ago
- Bloodhound agent for Mythic☆19Updated last month
- ☆32Updated last year
- A Python gRPC Client Library for Sliver☆68Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Open IOC sharing platform☆56Updated 6 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆79Updated 9 months ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆28Updated 10 months ago
- ☆37Updated last year