MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
☆127Apr 24, 2023Updated 2 years ago
Alternatives and similar repositories for AdversaryEmulation
Users that are interested in AdversaryEmulation are comparing it to the libraries listed below
Sorting:
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,072May 28, 2025Updated 9 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- A CALDERA plugin☆81Feb 17, 2026Updated 2 weeks ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆551May 6, 2025Updated 9 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- ☆50Jan 30, 2026Updated last month
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Jun 14, 2023Updated 2 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72May 14, 2022Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Jan 1, 2026Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Updated this week
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Feb 25, 2024Updated 2 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian☆18Aug 7, 2024Updated last year
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆612Dec 8, 2025Updated 2 months ago
- ☆553Dec 4, 2023Updated 2 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,059Oct 5, 2023Updated 2 years ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆374Dec 9, 2022Updated 3 years ago