2dukes / Cyber-Range-FrameworkLinks
Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses an approach heavily reliant on DevOps and IaC and is featured with Linux and Windows-based vulnerabilities related to Apache Log4j, Ransomware and Active Directory.
☆34Updated last year
Alternatives and similar repositories for Cyber-Range-Framework
Users that are interested in Cyber-Range-Framework are comparing it to the libraries listed below
Sorting:
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- https://lolad-project.github.io/☆80Updated 8 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 10 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆144Updated last month
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated 2 weeks ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆190Updated 10 months ago
- Automated Active Directory lab running on Proxmox☆83Updated 3 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆211Updated 5 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- ☆104Updated last month
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- ☆41Updated last year
- Creation of a laboratory for malware analysis in AWS☆103Updated 2 years ago
- Living Off Security Tools☆45Updated 10 months ago
- ☆21Updated 2 years ago
- ☆40Updated 8 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- Dredging up secrets from the depths of the file system☆131Updated 9 months ago
- ☆12Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago