facebookincubator / ForgeArmoryLinks
ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).
☆113Updated 9 months ago
Alternatives and similar repositories for ForgeArmory
Users that are interested in ForgeArmory are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆168Updated 5 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆165Updated 8 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆81Updated last month
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆88Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆129Updated this week
- An index of publicly available and open-source threat detection rulesets.☆114Updated 2 months ago
- A repository to share publicly available Velociraptor detection content☆173Updated last week
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- Anvilogic Forge☆104Updated 2 weeks ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Threat Simulation Indexes☆38Updated last month
- Active C&C Detector☆154Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated 3 weeks ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆41Updated last month
- An opensource sigma conversion tool built using pysigma☆130Updated last week
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 11 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated this week
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- ☆92Updated last month
- ☆175Updated 2 years ago
- A preconfigured Velociraptor triage collector☆52Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆168Updated 7 months ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 4 months ago