tenable / atomic-red-teamLinks
Small and highly portable detection tests based on MITRE's ATT&CK.
☆10Updated 8 months ago
Alternatives and similar repositories for atomic-red-team
Users that are interested in atomic-red-team are comparing it to the libraries listed below
Sorting:
- A few quick recipes for those that do not have much time during the day☆22Updated 11 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- My Jupyter Notebooks☆36Updated 7 months ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- SANS Slingshot Linux Distribution☆54Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆42Updated 5 years ago
- A CALDERA plugin☆26Updated 2 weeks ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- ☆77Updated 2 weeks ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- ☆21Updated 2 years ago
- ☆55Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago
- A script to create and assign SOP tasks into the cases☆20Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 5 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆61Updated 4 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago