redcanaryco / chain-reactor
Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
☆292Updated 2 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for chain-reactor
- Misc Threat Hunting Resources☆372Updated last year
- Threat Hunting & Incident Investigation with Osquery☆198Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆256Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆182Updated this week
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆539Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆208Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆286Updated last month
- A list of my personal projects☆167Updated 2 years ago
- Threat Hunting tool about Sysmon and graphs☆329Updated last year
- Tool Analysis Result Sheet☆345Updated 6 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆468Updated last year
- DFIRTrack - The Incident Response Tracking Application☆482Updated 2 months ago
- Public Repo for Atomic Test Harness☆252Updated 4 months ago
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆267Updated 10 months ago
- Atomic Purple Team Framework and Lifecycle☆283Updated 3 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆266Updated 10 months ago
- ☆168Updated 4 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆181Updated 2 years ago
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆258Updated last year
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆193Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆237Updated 3 years ago
- A knowledge base of actionable Incident Response techniques☆614Updated 2 years ago
- Sigma rules from Joe Security☆203Updated 2 weeks ago
- Collection of created MindMaps☆151Updated last year
- ☆208Updated last year
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆350Updated 4 years ago
- Searches For Threat Hunting and Security Analytics☆239Updated 3 years ago
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆310Updated 5 months ago