mitre / caldera-ot
MITRE Caldera™ for OT Plugins & Capabilities
☆193Updated last month
Related projects ⓘ
Alternatives and complementary repositories for caldera-ot
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆202Updated last year
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆306Updated 5 months ago
- Rules generated from our investigations.☆188Updated last week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆165Updated 4 months ago
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆324Updated last month
- MISP Playbooks☆174Updated 3 weeks ago
- ☆66Updated 2 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆123Updated 8 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆179Updated 10 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆108Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆274Updated 6 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆180Updated 2 years ago
- An opensource sigma conversion tool built using pysigma☆95Updated this week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆104Updated this week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆520Updated 2 months ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆142Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆157Updated 11 months ago
- A curated repository of incident response playbooks☆61Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆189Updated last month
- Resources To Learn And Understand SIGMA Rules☆167Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆142Updated 2 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆320Updated last week
- Documentation and scripts to properly enable Windows event logs.☆553Updated last year
- Signatures and IoCs from public Volexity blog posts.☆315Updated 3 months ago
- Tools for simulating threats☆174Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆137Updated 2 months ago
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆129Updated this week
- The Sigma command line interface based on pySigma☆134Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆239Updated 6 months ago