cisagov / cset
Cybersecurity Evaluation Tool
☆1,419Updated this week
Related projects: ⓘ
- ☆2,156Updated 11 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆1,905Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,040Updated 4 months ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,658Updated 8 months ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,411Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆1,972Updated this week
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,051Updated last year
- MITRE ATT&CK Website☆483Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,715Updated 3 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,052Updated 2 weeks ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,395Updated last month
- An informational repo about hunting for adversaries in your IT environment.☆1,692Updated 2 years ago
- A repository of sysmon configuration modules☆2,621Updated last month
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,715Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,224Updated last year
- Windows Events Attack Samples☆2,198Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆818Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,363Updated last week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆998Updated 2 weeks ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆481Updated 5 months ago
- Microsoft Threat Intelligence Security Tools☆1,752Updated this week
- Re-play Security Events☆1,584Updated 6 months ago
- Open Source Security Events Metadata (OSSEM)☆1,228Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆3,975Updated 7 months ago
- ☆560Updated last year
- Configuration files for the SOF-ELK VM☆1,470Updated last month
- A collection of resources for Threat Hunters☆845Updated 2 months ago
- Splunk Security Content☆1,251Updated this week
- TrustedSec Sysinternals Sysmon Community Guide☆1,125Updated 4 months ago
- Digging Deeper....☆2,878Updated this week