Test Blue Team detections without running any attack.
-
Updated
May 2, 2024 - C#
Test Blue Team detections without running any attack.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
A forked version of Atomic YAML instructions and technique dependencies used by ARTiC2 controllers to construct and execute red team atomic test cases from memory
🏰 AI-powered Windows security monitoring with conversational AI chat for natural language threat hunting. Features human-in-the-loop actions, YARA malware detection, MITRE ATT&CK mapping, vector search & threat intelligence. React dashboard with real-time updates. 12K+ events/sec. .NET 8, Ollama/OpenAI, Qdrant.
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."