microsoft / CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
☆1,652Updated 3 weeks ago
Related projects: ⓘ
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,224Updated last year
- ☆2,642Updated 6 months ago
- Understand adversary tradecraft and improve detection strategies☆699Updated last year
- Automated Adversary Emulation Platform☆5,514Updated 2 weeks ago
- Microsoft Threat Intelligence Security Tools☆1,752Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,658Updated 8 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆1,972Updated this week
- Cybersecurity Evaluation Tool☆1,419Updated this week
- Open EDR public repository☆2,224Updated 8 months ago
- Main Sigma Rule Repository☆8,106Updated last week
- Guidance for mitigation web shells. #nsacyber☆961Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,395Updated last month
- ☆1,902Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆4,094Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,920Updated 2 months ago
- Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own in…☆3,154Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,715Updated 3 weeks ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,081Updated this week
- Defences against Cobalt Strike☆1,270Updated 2 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,509Updated last year
- ☆560Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,503Updated 2 months ago
- Detect Tactics, Techniques & Combat Threats☆2,040Updated 4 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,479Updated 3 weeks ago
- Digging Deeper....☆2,878Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆1,905Updated this week
- Adversarial Threat Landscape for AI Systems☆1,037Updated last year
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆870Updated last week
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,411Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,699Updated 3 months ago