cmu-sei / crucibleLinks
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆34Updated last week
Alternatives and similar repositories for crucible
Users that are interested in crucible are comparing it to the libraries listed below
Sorting:
- Collection of Jupyter Notebooks by @fr0gger_☆161Updated 3 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆52Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago
- ☆69Updated last month
- Tools for simulating threats☆185Updated last year
- Docker image for Velocidex Velociraptor☆126Updated 2 months ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆31Updated 11 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆25Updated this week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆112Updated 6 months ago
- A packet capture visualizer for industrial control networks.☆54Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆109Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Rules generated from our investigations.☆195Updated this week
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 7 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆181Updated 3 weeks ago
- ☆52Updated last year
- Jupyter notebooks for threat hunting☆56Updated 2 months ago
- An opensource sigma conversion tool built using pysigma☆129Updated 5 months ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆141Updated last month
- A list of my personal projects☆177Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Automating Security Detection Engineering, published by Packt☆54Updated 7 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆154Updated 3 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Incident Response documents and tooling☆74Updated last year