cisagov / cool-assessment-terraformLinks
Terraform to deploy an assessment environment to the COOL
☆16Updated last week
Alternatives and similar repositories for cool-assessment-terraform
Users that are interested in cool-assessment-terraform are comparing it to the libraries listed below
Sorting:
- Collection of useful Canary tools☆90Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆174Updated last week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆79Updated 3 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated last week
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 6 months ago
- ☆75Updated this week
- A Docker container for remote penetration testing.☆140Updated 4 years ago
- A python package for use in generating fake data for SOC and security automation.☆170Updated 6 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆84Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- ☆187Updated last week
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆41Updated 5 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆32Updated this week
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- ☆163Updated this week
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- ☆74Updated 2 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 2 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 5 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆82Updated last week
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated last year
- Repo for Concierge AI dev work☆197Updated last week
- Plugin source code for the InsightConnect SOAR product, developer documentation at https://docs.rapid7.com/insightconnect/getting-started☆66Updated last week
- Intrusion Detection Honeypots Book Code☆25Updated 5 years ago