facebookincubator / ForgeArmoryLinks
ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).
☆115Updated 10 months ago
Alternatives and similar repositories for ForgeArmory
Users that are interested in ForgeArmory are comparing it to the libraries listed below
Sorting:
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 9 months ago
- Mapping of open-source detection rules and atomic tests.☆170Updated 6 months ago
- Active C&C Detector☆155Updated last year
- Threat Simulation Indexes☆38Updated 3 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated last month
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆119Updated 3 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆136Updated this week
- Anvilogic Forge☆105Updated 2 weeks ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆100Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆92Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last week
- pocket guide for core detection engineering concepts☆29Updated 2 years ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆172Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- ☆146Updated 2 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆95Updated 5 months ago
- ☆138Updated last week
- A list of RMMs designed to be used in automation to build alerts☆112Updated 3 months ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆171Updated 9 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆31Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆129Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2025☆34Updated 6 months ago
- ☆175Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 months ago
- A home for detection content developed by the delivr.to team☆69Updated last week
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆134Updated last year
- NOVA: The Prompt Pattern Matching☆144Updated last week