Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses an approach heavily reliant on DevOps and IaC and is featured with Linux and Windows-based vulnerabilities related to Apache Log4j, Ransomware and Active Directory.
☆39Apr 5, 2024Updated last year
Alternatives and similar repositories for Cyber-Range-Framework
Users that are interested in Cyber-Range-Framework are comparing it to the libraries listed below
Sorting:
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Nov 2, 2022Updated 3 years ago
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- CyRIS: Cyber Range Instantiation System☆110Dec 19, 2024Updated last year
- Maritime Cyber Security Testbed☆33Apr 17, 2024Updated last year
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- A spyware free reimagination of Bonzi Buddy using WinForms and Double Agent.☆10Feb 23, 2023Updated 3 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆44Aug 29, 2022Updated 3 years ago
- CS 495/595 Web Security☆10Feb 27, 2022Updated 4 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year
- CTF writeups☆16Nov 25, 2025Updated 3 months ago
- Dockerized TOR socks5☆10Jul 15, 2018Updated 7 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆20Feb 1, 2026Updated last month
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- ☆18Jan 15, 2026Updated last month
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- ☆10May 17, 2024Updated last year
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- FULL v0, Cursor, Manus, Same.dev, Lovable, Devin, Replit Agent, Windsurf Agent, VSCode Agent, Dia Browser & Trae AI (And other Open Sourc…☆17May 31, 2025Updated 9 months ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago