2dukes / Cyber-Range-Framework
Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses an approach heavily reliant on DevOps and IaC and is featured with Linux and Windows-based vulnerabilities related to Apache Log4j, Ransomware and Active Directory.
☆28Updated 11 months ago
Alternatives and similar repositories for Cyber-Range-Framework:
Users that are interested in Cyber-Range-Framework are comparing it to the libraries listed below
- https://lolad-project.github.io/☆74Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆93Updated last year
- Automated Active Directory lab running on Proxmox☆76Updated 3 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated last year
- ☆40Updated 7 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆52Updated 5 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆119Updated 11 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆134Updated last month
- Ping-based Information Lookup and Outbound Transfer☆76Updated 11 months ago
- ☆38Updated 3 months ago
- ☆51Updated last month
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆78Updated 5 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆102Updated 11 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last week
- Mapping of open-source detection rules and atomic tests.☆158Updated 2 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 7 months ago
- ☆19Updated last year
- ☆37Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated last week
- Dredging up secrets from the depths of the file system☆125Updated 4 months ago
- List of Command&Control (C2) software☆36Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆114Updated this week
- ☆80Updated last month