cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆36Updated 2 weeks ago
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- A virtual appliance for building cyber labs, challenges and competitions☆26Updated 2 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- Tools for simulating threats☆186Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆170Updated last week
- Zerofox Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆37Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Industrial Control Systems Network Protocol Parsers☆176Updated last month
- CrowdStrike's Open Source Policy & Contribution Guide☆40Updated 2 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆218Updated 2 months ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆229Updated 5 months ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- An opensource sigma conversion tool built using pysigma☆130Updated last week
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆297Updated 8 months ago
- Python library for threat intelligence☆87Updated 5 months ago
- A packet capture visualizer for industrial control networks.☆55Updated last year
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆183Updated last month
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆71Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- Docker image for Velocidex Velociraptor☆128Updated 3 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated 2 weeks ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated 8 months ago
- Jupyter notebooks for threat hunting☆56Updated 3 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Repository of attack and defensive information for Business Email Compromise investigations☆256Updated last month