center-for-threat-informed-defense / technique-inference-engine
TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.
☆14Updated 2 weeks ago
Related projects: ⓘ
- ☆10Updated last month
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆23Updated 2 months ago
- ☆14Updated last year
- Can you pay the ransom in your country?☆13Updated 9 months ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆15Updated 6 months ago
- Qemuno Framework☆23Updated 2 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- Offensive Research Guide to Help Defense Improve Detection☆29Updated last year
- ☆15Updated 2 years ago
- ☆40Updated 5 months ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆18Updated 6 months ago
- Ransomware Simulator for testing Blue Team Detections☆34Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆29Updated 2 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated this week
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 3 weeks ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- ShellSweeping the evil.☆49Updated 3 months ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆36Updated 5 months ago
- Yara rules☆18Updated last year
- Penguin OS Forensic (or Flight) Recorder☆37Updated 2 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆14Updated last month
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆20Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- A home for detection content developed by the delivr.to team☆56Updated 2 weeks ago
- ☆50Updated last year