tstromberg / ttp-benchLinks
Adversary emulation for EDR/SIEM testing (macOS/Linux)
☆44Updated last year
Alternatives and similar repositories for ttp-bench
Users that are interested in ttp-bench are comparing it to the libraries listed below
Sorting:
- Automated testing, generation & manipulation of #osquery packs☆73Updated 8 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆57Updated last year
- A repository to store Rad Fingerprinting data.☆24Updated 10 months ago
- ☆54Updated this week
- ☆88Updated 3 weeks ago
- Compares and analyzes GCP IAM roles.☆77Updated 3 months ago
- ☆73Updated this week
- pocket guide for core detection engineering concepts☆28Updated 2 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Updated last year
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- ☆113Updated this week
- ☆41Updated last month
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- ☆45Updated 7 months ago
- GCP CSPM using Google Sheets☆36Updated 2 months ago
- vexctl is a tool to attest VEX impact statements☆44Updated 2 years ago
- TACOS framework structural details☆20Updated last month
- Golang-based SDK to CrowdStrike's APIs☆67Updated this week
- ☆11Updated 4 months ago
- Audit log wall of shame.☆41Updated 8 months ago
- Security Alert Decoration☆27Updated last month
- ☆44Updated 3 months ago
- ☆20Updated last month
- Kubernetes Unhinged Shell 😎☆46Updated 2 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆30Updated this week
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 9 months ago