adversary_emulation_library
TheHive
Our great sponsors
adversary_emulation_library | TheHive | |
---|---|---|
8 | 24 | |
1,545 | 3,166 | |
4.1% | 2.3% | |
9.5 | 0.0 | |
4 months ago | over 1 year ago | |
C | Scala | |
Apache License 2.0 | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
adversary_emulation_library
-
What adversary emulation options are there nowadays to test SIEMs and IDSs?
Unfortunately I don't have the background and knowledge of cybersecurity needed to plan a pentest of my own. Also, it would be more interesting to emulate the attacks of actual APTs known in the wild. So far, I've tested Caldera, Invoke-AtomicRedTeam and manual tests from CTID's adversary emulation library: https://github.com/center-for-threat-informed-defense/adversary_emulation_library
- adversary_emulation_library: An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
-
New blue team
This is a great callout! To help get started, check out the adversary emulation library, https://github.com/center-for-threat-informed-defense/adversary_emulation_library. There are also micro-emulation plans, described here: https://ctid.mitre-engenuity.org/our-work/micro-emulation-plans/.
- micro_emulation_plans: This collection expands the impact of the Adversary Emulation Library by developing easy-to-execute adversary emulation content that targets specific behaviors and challenges facing defenders
-
Advice on purple teaming
I don't know how we know what CS would do if that command was part of a chain of attack, I'm assuming it would just detect on the more malicious activities. Once we get a bit more mature in our use of Atomic Red team I was looking at this framework for simulating an actual attack chain.
- THT: When hunt APT look for emulation ...
- Adversary Emulation Library
- menuPass Adversary Emulation
TheHive
-
What are your go-to tools for task management and/or case work?
I had a quick test with the hive looks pretty nice. https://thehive-project.org/
-
Taking Notes: What are your techniques as security professionals?
Also look into hive. Lots of people are moving that direction. https://thehive-project.org/
-
Free Tech Tools and Resources - Connection Tracing, Throttling Tool, Log Search & More
TheHive is a versatile open-source solution for streamlining the investigation and prompt handling of security incidents. Seamlessly integrates with MISP to facilitate the transition from event analysis to investigation initiation, enabling efficient synchronization and export for collaborative threat detection and response. Moreover, coupling TheHive with Cortex empowers security professionals to efficiently analyze up to hundreds of observables. Timely-Lychee-5204 describes it as, "an open-source and scalable Security Incident Response Platform designed for handling incidents efficiently."
-
Monthly Security Checklist
TheHive/Cortex - https://thehive-project.org/
- Does anyone have experience with self-hosted endpoint security solutions?
-
Software for recording security incidents?
i recommend TheHive for creating incident tickets. it is opensource but there is paid one offered by StrangeBee
-
Warning: Do not use Hive Social
Also unrelated to TheHive project, a security incident response tool.
https://thehive-project.org/
- New blue team
- 22 OSINT service for vulnerability detection that can be utilized in IT security.
-
Incident Response: What tool workflow do you use to collaborate on and document IR?
I haven't done any IR myself, but I was thinking something like TheHive Project (open source) or similar proprietary IR toolsets would be common. But over on r/blueteamsec I just saw this post, where people claimed to be using:
What are some alternatives?
tram - TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
sysmon-modular - A repository of sysmon configuration modules
velociraptor - Digging Deeper....
attack-flow - Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
grr - GRR Rapid Response: remote live forensics for incident response
attack-control-framework-mappings - 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
RedEye - RedEye is a visual analytic tool supporting Red & Blue Team operations
dislocker - FUSE driver to read/write Windows' BitLocker-ed volumes under Linux / Mac OSX
stix2.1-coa-playbook-extension - A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-readable security playbooks such as CACAO Security Playbooks
Kuiper - Digital Forensics Investigation Platform