ccdcoe / Providentia
Providentia is a tool to manage (mostly) virtualized infrastructure knowledge. Born out of necessity to build the world's largest live-fire cyber exercise - Locked Shields - it can also be used to organize infrastructure or smaller scale exercises. Essentially it is used as a front-end for Ansible inventory.
☆20Updated last year
Alternatives and similar repositories for Providentia:
Users that are interested in Providentia are comparing it to the libraries listed below
- Automated YARA Rule Standardization and Quality Assurance Tool☆205Updated last week
- The Sigma command line interface based on pySigma☆149Updated this week
- Stand up a simple Elastic container with Kibana, Fleet, and the Detection Engine☆445Updated 2 weeks ago
- ☆69Updated 2 weeks ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆207Updated 4 months ago
- pySigma backend for generating Grafana Loki/LogQL rules☆44Updated last week
- Transform Linux Audit logs for SIEM usage☆759Updated 2 weeks ago
- Docker image for MISP☆125Updated 3 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 3 months ago
- ☆136Updated last month
- MISP Playbooks☆194Updated 2 months ago
- Forensic Artifact Collection Tool Matrix☆83Updated 5 months ago
- An opensource sigma conversion tool built using pysigma☆122Updated 3 months ago
- Sigma rule specification☆129Updated last month
- Awesome Incident Response☆269Updated last year
- Tuoni☆92Updated 2 weeks ago
- Signatures and IoCs from public Volexity blog posts.☆352Updated 2 months ago
- Rules generated from our investigations.☆194Updated 3 weeks ago
- Infrastructure Automation☆344Updated last year
- Docker image for Velocidex Velociraptor☆123Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆149Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆277Updated last week
- A standard for reducing log volume without sacrificing analytical capability☆203Updated last month
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆356Updated 3 months ago
- A production ready Dockered MISP☆223Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆138Updated 11 months ago
- A repository to share publicly available Velociraptor detection content☆154Updated this week
- An implementation of a Windows Event Collector server running on GNU/Linux.☆70Updated last week