2dukes / Cyber-Range-FrameworkLinks
Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses an approach heavily reliant on DevOps and IaC and is featured with Linux and Windows-based vulnerabilities related to Apache Log4j, Ransomware and Active Directory.
☆34Updated last year
Alternatives and similar repositories for Cyber-Range-Framework
Users that are interested in Cyber-Range-Framework are comparing it to the libraries listed below
Sorting:
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆96Updated last month
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated 11 months ago
- https://lolad-project.github.io/☆81Updated 9 months ago
- Vagrant provisioning scripts to create a simulated network environment for tabletop exercises☆37Updated 3 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Automated Active Directory lab running on Proxmox☆85Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- An open-source self-hosted purple team management web application.☆288Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 7 months ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- ☆74Updated this week
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- ☆22Updated 2 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated last year
- ☆12Updated 4 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 4 months ago
- Dredging up secrets from the depths of the file system☆131Updated 11 months ago
- Mapping of open-source detection rules and atomic tests.☆177Updated 8 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆212Updated 6 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Deny list generator for password filters☆25Updated last year
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 8 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year