cmu-sei / crucible
Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.
☆34Updated last week
Alternatives and similar repositories for crucible:
Users that are interested in crucible are comparing it to the libraries listed below
- A virtual appliance for building cyber labs, challenges and competitions☆25Updated 2 weeks ago
- Collection of Jupyter Notebooks by @fr0gger_☆159Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 3 weeks ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆63Updated last month
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆108Updated 2 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Tools for simulating threats☆183Updated last year
- Cisco Orbital - Osquery queries by Talos☆131Updated 7 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆179Updated 11 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆207Updated this week
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- ☆35Updated this week
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- A packet capture visualizer for industrial control networks.☆53Updated last year
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆222Updated 3 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 11 months ago
- Home for Splunk security datasets.☆123Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- ☆83Updated 3 weeks ago
- Incident Response documents and tooling☆69Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆249Updated 2 months ago
- ☆54Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- InsightVM helpful SQL queries☆64Updated last month
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆217Updated 2 weeks ago