unfetter-discover / unfetterView external linksLinks
The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose files, issue tracking, and documentation
☆415Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for unfetter
Users that are interested in unfetter are comparing it to the libraries listed below
Sorting:
- Main Build directory☆179May 1, 2019Updated 6 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆164May 11, 2020Updated 5 years ago
- The front end Angular repository for Unfetter-Discover☆15Dec 26, 2018Updated 7 years ago
- An information security preparedness tool to do adversarial simulation.☆1,142Apr 1, 2019Updated 6 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- ☆1,093May 1, 2019Updated 6 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆1,229Dec 12, 2022Updated 3 years ago
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,037May 27, 2020Updated 5 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,262Jan 21, 2026Updated 3 weeks ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆881Nov 17, 2020Updated 5 years ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,592Dec 24, 2022Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Jan 21, 2020Updated 6 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated last month
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,361Feb 4, 2026Updated 2 weeks ago
- An informational repo about hunting for adversaries in your IT environment.☆1,846Nov 17, 2021Updated 4 years ago
- Automated Adversary Emulation Platform☆6,748Updated this week
- WALKOFF-enabled applications. #nsacyber☆143Mar 14, 2019Updated 6 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,546Feb 10, 2026Updated last week
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,710Sep 23, 2025Updated 4 months ago
- A Powershell incident response framework☆1,639Nov 22, 2022Updated 3 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated last month
- A framework for developing alerting and detection strategies for incident response.☆838Sep 8, 2025Updated 5 months ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,883Jul 25, 2025Updated 6 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,900Jul 6, 2024Updated last year
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated last month
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,321Feb 7, 2026Updated last week
- A repository of sysmon configuration modules☆2,968Aug 21, 2024Updated last year
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆406Dec 8, 2022Updated 3 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- Your Everyday Threat Intelligence☆1,949Updated this week
- Create actionable data from your Vulnerability Scans☆1,397Dec 27, 2022Updated 3 years ago
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- CRITs - Collaborative Research Into Threats☆908Jul 29, 2019Updated 6 years ago