2dukes / Cyber-Range-Framework
Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses an approach heavily reliant on DevOps and IaC and is featured with Linux and Windows-based vulnerabilities related to Apache Log4j, Ransomware and Active Directory.
☆30Updated last year
Alternatives and similar repositories for Cyber-Range-Framework
Users that are interested in Cyber-Range-Framework are comparing it to the libraries listed below
Sorting:
- Automated Active Directory lab running on Proxmox☆75Updated last month
- https://lolad-project.github.io/☆75Updated 4 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆73Updated 3 weeks ago
- ☆37Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆93Updated last year
- ☆96Updated 3 weeks ago
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆142Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆41Updated 2 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆87Updated this week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆138Updated 2 months ago
- VM Lab for security☆9Updated last year
- ☆40Updated 8 months ago
- Living Off Security Tools☆44Updated 6 months ago
- ☆80Updated 5 months ago
- ☆20Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆82Updated 3 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 11 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆36Updated 2 weeks ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆92Updated 9 months ago