cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆45Updated 3 weeks ago
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- Collection of Jupyter Notebooks by @fr0gger_☆189Updated 3 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆646Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆168Updated last month
- Tools for simulating threats☆199Updated 2 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆28Updated 3 months ago
- Docker image for Velocidex Velociraptor☆142Updated last week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated 2 months ago
- Industrial Control Systems Network Protocol Parsers☆186Updated 4 months ago
- Jupyter notebooks for threat hunting☆60Updated 9 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆248Updated 9 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated last month
- A tool to host an Internet simulation☆60Updated 8 months ago
- Cisco Orbital - Osquery queries by Talos☆136Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆231Updated 2 weeks ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆272Updated 7 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated last week
- OSSEM Data Dictionaries☆65Updated 11 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆141Updated last year
- Awesome Incident Response☆283Updated 3 months ago
- A repository of my own Sigma detection rules.☆163Updated last month
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆144Updated 3 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆155Updated last month
- A cybersecurity game in Azure Data Explorer☆174Updated last year
- Threat Intel Platform for T-POTs☆161Updated this week