The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose files, issue tracking, and documentation
☆416Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for unfetter
Users that are interested in unfetter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Main Build directory☆179May 1, 2019Updated 6 years ago
- The front end Angular repository for Unfetter-Discover☆15Dec 26, 2018Updated 7 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆164May 11, 2020Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 7 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆1,227Dec 12, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆356Nov 3, 2020Updated 5 years ago
- ☆1,091May 1, 2019Updated 6 years ago
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 2 months ago
- WALKOFF-enabled applications. #nsacyber☆143Mar 14, 2019Updated 7 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,593Dec 24, 2022Updated 3 years ago
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- Retrieves the definitions of Windows Event Log messages embedded in Windows binaries and provides them in discoverable formats. #nsacyber☆407Dec 8, 2022Updated 3 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Automated Adversary Emulation Platform☆6,868Updated this week
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,858Nov 17, 2021Updated 4 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,511Jan 12, 2026Updated 2 months ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,555Updated this week
- Create actionable data from your Vulnerability Scans☆1,396Dec 27, 2022Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Aug 3, 2019Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,352Apr 2, 2026Updated last week
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,365Updated this week
- Utilities for MITRE™ ATT&CK☆1,049Jan 3, 2026Updated 3 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,932Jul 6, 2024Updated last year
- Laika BOSS: Object Scanning System☆751Dec 16, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- A Powershell incident response framework☆1,644Nov 22, 2022Updated 3 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,895Jul 25, 2025Updated 8 months ago
- A repository of sysmon configuration modules☆3,007Aug 21, 2024Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,361Apr 4, 2024Updated 2 years ago