cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆38Updated 2 months ago
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆609Updated this week
- Collection of Jupyter Notebooks by @fr0gger_☆177Updated last week
- Tools for simulating threats☆193Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆125Updated 4 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆160Updated 7 months ago
- A virtual appliance for building cyber labs, challenges and competitions☆27Updated 3 weeks ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆112Updated 3 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆225Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 3 weeks ago
- Docker image for Velocidex Velociraptor☆136Updated 6 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆231Updated 5 months ago
- Cyber Incident Response Team Playbook Battle Cards☆416Updated last year
- Awesome Incident Response☆280Updated last month
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆237Updated 8 months ago
- Industrial Control Systems Network Protocol Parsers☆179Updated 3 weeks ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆274Updated 3 weeks ago
- Rules generated from our investigations.☆201Updated 3 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 11 months ago
- Indexes for SANS Courses and GIAC Certifications☆260Updated last year
- Jupyter notebooks for threat hunting☆59Updated 6 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆262Updated 4 months ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆155Updated 6 months ago
- An opensource sigma conversion tool built using pysigma☆133Updated last month
- LogRhythm PowerShell Toolkit☆51Updated last month
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year
- A list of my personal projects☆177Updated 3 years ago
- Automating Security Detection Engineering, published by Packt☆62Updated 11 months ago