A Self-Contained Open-Source Cyberattack Experimentation Testbed
☆43Feb 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for socbed
Users that are interested in socbed are comparing it to the libraries listed below
Sorting:
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- ☆11Updated this week
- ☆21Nov 7, 2023Updated 2 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Oct 13, 2025Updated 4 months ago
- ☆20May 10, 2023Updated 2 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆23Jul 8, 2016Updated 9 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆26Apr 8, 2019Updated 6 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Azul is a malware repository for reverse engineers, incident responders and everyone in-between.☆123Jan 19, 2026Updated last month
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆38Feb 14, 2026Updated 3 weeks ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 5 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Decode HikVision device export QR codes.☆16May 5, 2025Updated 10 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Microsoft Sentinel related content☆38Jan 22, 2025Updated last year
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆672Mar 2, 2026Updated last week
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆97Jan 13, 2026Updated last month
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Jul 12, 2023Updated 2 years ago
- POC of sudo password stealer☆36Feb 10, 2021Updated 5 years ago