Test Blue Team detections without running any attack.
-
Updated
May 2, 2024 - C#
Test Blue Team detections without running any attack.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
BasicEventViewer4 (BEV v4.0), this code will useful for All Blue/Purple Teams , RealTime Monitoring Sysmon Events , Mitre Attack Detections via yaml files
A forked version of Atomic YAML instructions and technique dependencies used by ARTiC2 controllers to construct and execute red team atomic test cases from memory
🏰 AI-powered Windows security monitoring with real-time threat detection, LLM analysis, vector search & MITRE ATT&CK mapping. Features YARA malware detection, timeline visualization, threat intelligence (VirusTotal/MalwareBazaar), React admin UI & thousands events/sec processing. Built with .NET 8, Ollama/OpenAI, Qdrant.
Add a description, image, and links to the mitre-attack topic page so that developers can more easily learn about it.
To associate your repository with the mitre-attack topic, visit your repo's landing page and select "manage topics."