cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆46Updated last week
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Industrial Control Systems Network Protocol Parsers☆188Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- MITRE Caldera™ for OT Plugins & Capabilities☆232Updated last month
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆653Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆168Updated last month
- Tools for simulating threats☆199Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆43Updated last week
- Jupyter notebooks for threat hunting☆60Updated 10 months ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- A repository of my own Sigma detection rules.☆163Updated 2 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated 3 months ago
- OSSEM Data Dictionaries☆65Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated last week
- ☆73Updated 9 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Updated 3 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- A packet capture visualizer for industrial control networks.☆55Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆147Updated 3 weeks ago
- Conference presentations☆60Updated 3 months ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Incident Response documents and tooling☆111Updated last month
- SIEGMA - Transform Sigma rules into SIEM consumables☆158Updated 10 months ago
- President's Cup Cybersecurity Competition Challenges☆195Updated 5 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆251Updated 9 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- Awesome Incident Response☆284Updated 4 months ago
- Practical Threat Detection Engineering, Published by Packt☆84Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated 2 years ago