cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆44Updated last week
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- Collection of Jupyter Notebooks by @fr0gger_☆185Updated last month
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆625Updated last week
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Industrial Control Systems Network Protocol Parsers☆182Updated 2 months ago
- Docker image for Velocidex Velociraptor☆140Updated 8 months ago
- Tools for simulating threats☆197Updated 2 years ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆166Updated last month
- An opensource sigma conversion tool built using pysigma☆147Updated last month
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆243Updated 7 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆287Updated this week
- Awesome Incident Response☆283Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 3 weeks ago
- ☆72Updated 7 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Updated 7 months ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- A repository of my own Sigma detection rules.☆162Updated last year
- Automating Security Detection Engineering, published by Packt☆64Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆98Updated 2 months ago
- Intelligence Architecture Mind Map☆138Updated last year
- Rules generated from our investigations.☆202Updated 5 months ago
- OSSEM Data Dictionaries☆65Updated 10 months ago
- Practical Threat Detection Engineering, Published by Packt☆78Updated 2 years ago
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- ☆99Updated 3 weeks ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆51Updated 6 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆29Updated last week
- Repository of attack and defensive information for Business Email Compromise investigations☆268Updated 6 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆300Updated last week