mitre / mock
A CALDERA plugin
☆13Updated last year
Alternatives and similar repositories for mock:
Users that are interested in mock are comparing it to the libraries listed below
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- ☆11Updated 4 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- A CALDERA plugin☆22Updated last year
- Simplified go-cat agent for caldera☆10Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A CALDERA plugin for autonomous incident response☆26Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆14Updated last year
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- ☆20Updated 7 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆11Updated 3 years ago
- ☆21Updated 3 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Automate the regular transfer of AIS data into a MISP Server☆9Updated 11 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago