Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a methodology for creating technique collections.
☆14May 28, 2025Updated 10 months ago
Alternatives and similar repositories for defending-iaas-with-attack
Users that are interested in defending-iaas-with-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆58Feb 15, 2021Updated 5 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆52Jun 21, 2025Updated 9 months ago
- Ansible Collection for Splunk Enterprise Security ES☆14Updated this week
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 7 months ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Helm Chart to deploy Twistlock Defender☆14Feb 13, 2026Updated last month
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆122May 28, 2025Updated 10 months ago
- Complete CNAPP Demo using Prisma Cloud☆17Mar 26, 2025Updated last year
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Rapid Response sample Foundry app☆17Mar 23, 2026Updated last week
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆22Jan 28, 2025Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆20Apr 16, 2024Updated last year
- Add POST body excerpt to Bro's HTTP log☆14Dec 10, 2025Updated 3 months ago
- ☆16Jul 14, 2023Updated 2 years ago
- ☆31Jul 23, 2025Updated 8 months ago
- scripts and configs from .conf2016 talk on Hunting the Known Unknowns PowerShell Edition☆15Oct 25, 2016Updated 9 years ago
- Training slides, Terraform code, and instructions for trainers☆17Feb 20, 2026Updated last month
- ☆19May 30, 2022Updated 3 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- AzAdvertizer helps you to keep up with the pace by providing overview and insights on new releases and changes/updates for Azure Governan…☆40Sep 8, 2023Updated 2 years ago
- A GitHub action that organizes your post-mortems☆17Oct 12, 2022Updated 3 years ago
- Event forwarder for CrowdStrike Falcon☆11Jan 16, 2024Updated 2 years ago
- CrowdStrike Falcon log forwarder from falcon S3 bucket to your S3 bucket☆11Apr 15, 2021Updated 4 years ago
- ☆21Jul 30, 2024Updated last year
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- ☆19Mar 6, 2012Updated 14 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆28Feb 6, 2026Updated last month
- A python script for automating the collection of web pages with Hunchly.☆11Jan 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- ☆38Sep 14, 2020Updated 5 years ago
- A tool to analyse the list of detected CVEs in the containers (usually created by static security scanner) and compare them to the Red Ha…☆25Mar 8, 2023Updated 3 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Links and resources for the O'Reilly Kubernetes Security book☆45Sep 4, 2018Updated 7 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago