mrwadams / attackgen
AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE ATT&CK framework. The tool generates tailored incident response scenarios based on user-selected threat actor groups and your organisation's details.
☆1,037Updated last month
Alternatives and similar repositories for attackgen:
Users that are interested in attackgen are comparing it to the libraries listed below
- Awesome Security lists for SOC/CERT/CTI☆794Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆607Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆498Updated last week
- A resource containing all the tools each ransomware gangs uses☆867Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆552Updated 2 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,743Updated 2 weeks ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆384Updated last year
- A curated list of annual cyber security reports☆411Updated this week
- Playbooks for SOC Analysts☆393Updated 2 years ago
- Open Breach and Attack Simulation Platform☆806Updated this week
- Purple Team Exercise Framework☆652Updated last year
- A python module for working with ATT&CK☆499Updated this week
- Pen Test Report Generation and Assessment Collaboration☆456Updated this week
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆329Updated 2 months ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆569Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆893Updated last week
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆545Updated last month
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆641Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,412Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,091Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆230Updated this week
- Live Feed of C2 servers, tools, and botnets☆558Updated this week
- Galah: An LLM-powered web honeypot.☆456Updated 2 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆202Updated last month
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,285Updated this week
- An offensive data enrichment pipeline☆633Updated last month
- Map tracking ransomware, by OCD World Watch team☆421Updated 3 months ago
- PowerShell Digital Forensics & Incident Response Scripts.☆548Updated 2 weeks ago
- ☆254Updated last month
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆604Updated 7 months ago