crond-jaist / cyris
CyRIS: Cyber Range Instantiation System
☆99Updated last month
Alternatives and similar repositories for cyris:
Users that are interested in cyris are comparing it to the libraries listed below
- Data from a BRAWL Automated Adversary Emulation Exercise☆204Updated 4 years ago
- CASCADE Server☆264Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- Sample files for Control Things Platform☆37Updated 9 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆288Updated 7 years ago
- Automated Use Case Testing☆165Updated 6 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆257Updated 5 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆115Updated 4 years ago
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆19Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 5 years ago
- Analyst Unknown Cyber Range - a micro web service framework☆26Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆147Updated 10 months ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆89Updated 9 months ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆99Updated 4 years ago
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- A website and framework for testing NIDS detection☆56Updated 3 years ago
- Moki Distribution - ICS/SCADA Tools☆107Updated 7 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆124Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆101Updated 7 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆147Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Updated 3 years ago
- Place for resources used during the Mordor Detection hackathon event featuring APT29 ATT&CK evals datasets☆133Updated 4 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 3 years ago
- A CALDERA plugin☆74Updated 2 months ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- Download pcap files from http://www.malware-traffic-analysis.net/☆73Updated 7 years ago