microsoft / CyberBattleSimLinks
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
☆1,750Updated last week
Alternatives and similar repositories for CyberBattleSim
Users that are interested in CyberBattleSim are comparing it to the libraries listed below
Sorting:
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,302Updated 2 years ago
- Understand adversary tradecraft and improve detection strategies☆715Updated 2 years ago
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,532Updated last year
- ☆2,664Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆690Updated 4 years ago
- Defences against Cobalt Strike☆1,292Updated 3 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,330Updated this week
- Cybersecurity Evaluation Tool☆1,757Updated this week
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,311Updated this week
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,022Updated last month
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,523Updated 2 weeks ago
- ☆562Updated 2 years ago
- Open EDR public repository☆2,599Updated 2 years ago
- Microsoft Threat Intelligence Security Tools☆1,934Updated this week
- AutoPentest-DRL: Automated Penetration Testing Using Deep Reinforcement Learning☆416Updated 3 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,349Updated last year
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆797Updated last month
- Cyber Analytics Repository☆977Updated 8 months ago
- Re-play Security Events☆1,716Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,438Updated 3 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,739Updated 2 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆530Updated 4 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,065Updated 8 months ago
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆991Updated 2 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,399Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,315Updated 2 years ago
- MITRE ATT&CK Website☆565Updated last week
- Actionable analytics designed to combat threats☆1,006Updated 3 years ago