ccdcoe / ProvidentiaLinks
Providentia is a tool to manage (mostly) virtualized infrastructure knowledge. Born out of necessity to build the world's largest live-fire cyber exercise - Locked Shields - it can also be used to organize infrastructure or smaller scale exercises. Essentially it is used as a front-end for Ansible inventory.
☆24Updated last year
Alternatives and similar repositories for Providentia
Users that are interested in Providentia are comparing it to the libraries listed below
Sorting:
- Transform Linux Audit logs for SIEM usage☆808Updated 3 weeks ago
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆521Updated last month
- A production ready Dockered MISP☆303Updated last week
- Powerful infrastructure development tool based on Ansible☆14Updated this week
- Docker image for MISP☆137Updated this week
- An implementation of a Windows Event Collector server running on GNU/Linux.☆88Updated 2 weeks ago
- MITRE Caldera™ for OT Plugins & Capabilities☆231Updated 3 weeks ago
- A website and framework for testing NIDS detection☆309Updated 6 months ago
- Repo Filled With Follow Along Guides☆80Updated 3 years ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Updated 2 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆168Updated last month
- The Sigma command line interface based on pySigma☆170Updated last month
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆54Updated 2 months ago
- Docker image for Velocidex Velociraptor☆142Updated last week
- Convert Sigma rules to Wazuh rules☆73Updated 3 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆269Updated this week
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆646Updated this week
- BlueHound - pinpoint the security issues that actually matter☆758Updated 2 years ago
- Incident Response collection and processing scripts with automated reporting scripts☆319Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆489Updated last week
- Analyze pcaps with Zeek and a Grafana Dashboard☆188Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Forensic Artifact Collection Tool Matrix☆92Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- NTP Exfiltration Tool☆147Updated 2 years ago
- splunksecrets is a tool for working with Splunk secrets offline☆80Updated 7 months ago
- Sigma rule specification☆164Updated 3 weeks ago
- OpenVAS Reporting: Convert OpenVAS XML report files to reports☆157Updated this week