microsoft / CyberBattleSimLinks
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
☆1,752Updated 3 weeks ago
Alternatives and similar repositories for CyberBattleSim
Users that are interested in CyberBattleSim are comparing it to the libraries listed below
Sorting:
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,302Updated 2 years ago
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- Adversarial Threat Landscape for AI Systems☆1,096Updated 2 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,109Updated 3 weeks ago
- Understand adversary tradecraft and improve detection strategies☆713Updated 2 years ago
- Open EDR public repository☆2,589Updated 2 years ago
- ☆2,665Updated last year
- Microsoft Threat Intelligence Security Tools☆1,932Updated last week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,528Updated last year
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- MITRE ATT&CK Website☆559Updated last week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,291Updated this week
- Sophos-ReversingLabs 20 million sample dataset☆688Updated 4 years ago
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆989Updated last week
- ☆562Updated 2 years ago
- Cyber Analytics Repository☆973Updated 7 months ago
- Cybersecurity Evaluation Tool☆1,748Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,311Updated last week
- Re-play Security Events☆1,710Updated last year
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,010Updated 3 weeks ago
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆410Updated 3 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆529Updated 4 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,347Updated last year
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆924Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,315Updated 2 years ago
- Defences against Cobalt Strike☆1,291Updated 3 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆790Updated 3 weeks ago
- Detect Tactics, Techniques & Combat Threats☆2,256Updated 2 months ago
- Actionable analytics designed to combat threats☆1,005Updated 3 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆571Updated 2 years ago