An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
☆1,754Feb 11, 2026Updated 2 weeks ago
Alternatives and similar repositories for CyberBattleSim
Users that are interested in CyberBattleSim are comparing it to the libraries listed below
Sorting:
- Understand adversary tradecraft and improve detection strategies☆712Mar 9, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Automated Adversary Emulation Platform☆6,761Feb 17, 2026Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Updated this week
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- ☆2,665Mar 5, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- Open Source Security Events Metadata (OSSEM)☆1,287Feb 27, 2023Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,026Jul 1, 2024Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,906Jul 6, 2024Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,300Jun 1, 2023Updated 2 years ago
- Open EDR public repository☆2,604Jan 13, 2024Updated 2 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Updated this week
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,621Dec 13, 2025Updated 2 months ago
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago
- Infection Monkey - An open-source adversary emulation platform☆6,956May 1, 2025Updated 9 months ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,431Dec 27, 2022Updated 3 years ago
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,316Aug 10, 2023Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,548Jan 20, 2026Updated last month
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆863Jan 20, 2022Updated 4 years ago
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,527Oct 16, 2025Updated 4 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,457Feb 20, 2026Updated last week
- A repository of sysmon configuration modules☆2,980Aug 21, 2024Updated last year
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- Open Source EDR for Windows☆1,296Feb 25, 2023Updated 3 years ago
- Digging Deeper....☆3,771Feb 21, 2026Updated last week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,073May 28, 2025Updated 9 months ago
- PCAP Samples for Different Post Exploitation Techniques☆368Apr 29, 2021Updated 4 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,051Feb 17, 2022Updated 4 years ago