cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆43Updated last week
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- Collection of Jupyter Notebooks by @fr0gger_☆181Updated 3 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆620Updated this week
- Tools for simulating threats☆193Updated 2 years ago
- Industrial Control Systems Network Protocol Parsers☆181Updated last month
- MITRE Caldera™ for OT Plugins & Capabilities☆227Updated 2 months ago
- ☆72Updated 6 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆164Updated 3 weeks ago
- ☆42Updated 7 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆281Updated last week
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆240Updated 7 months ago
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 3 weeks ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆33Updated 3 weeks ago
- Practical Threat Detection Engineering, Published by Packt☆77Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆143Updated 2 weeks ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆78Updated 2 weeks ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆117Updated 6 months ago
- Automating Security Detection Engineering, published by Packt☆63Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆151Updated last week
- A tool to host an Internet simulation☆60Updated 6 months ago
- Awesome Incident Response☆283Updated last month
- MISP Playbooks☆215Updated 2 weeks ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆321Updated 6 months ago
- Incident Response documents and tooling☆106Updated last month
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆51Updated 5 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆267Updated 5 months ago
- Jupyter notebooks for threat hunting☆59Updated 7 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year