ait-testbed / attackmate
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
☆32Updated 3 weeks ago
Alternatives and similar repositories for attackmate:
Users that are interested in attackmate are comparing it to the libraries listed below
- yara detection rules for hunting with the threathunting-keywords project☆110Updated 3 weeks ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆40Updated 3 weeks ago
- An Adaptive Misuse Detection System☆37Updated 4 months ago
- Interactive, dynamic, and realistic LLM honeypots☆37Updated last month
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated last week
- Signature based honeypot detector tool written in Golang☆89Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- ☆41Updated 2 years ago
- ☆37Updated 11 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 2 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆121Updated last month
- Living off the False Positive!☆35Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 7 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆39Updated 7 months ago
- ☆31Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 2 weeks ago
- https://lolad-project.github.io/☆74Updated 2 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Search for c2 servers based on netlas☆39Updated last year
- Tool to spray AWS Console IAM Logins☆29Updated 2 years ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 4 months ago
- Open IOC sharing platform☆56Updated 4 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆54Updated last year
- Look into EDR events from network☆23Updated 11 months ago