Cyb3rWard0g / docker-calderaView external linksLinks
Docker Container to deploy Mitre Caldera Automated Adversary Emulation System
☆26Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for docker-caldera
Users that are interested in docker-caldera are comparing it to the libraries listed below
Sorting:
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A list of Mitre Caldera compatible emulation-plans☆14Feb 1, 2021Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Stamus Security Plat…☆13Jan 7, 2026Updated last month
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 7 years ago
- LNK to JSON☆14Mar 7, 2019Updated 6 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆28Mar 19, 2024Updated last year
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24May 20, 2023Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- Recover EXT filesystem info from carved directory blocks☆19Jun 23, 2017Updated 8 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22May 22, 2023Updated 2 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆55Feb 28, 2025Updated 11 months ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 11 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- ☆54May 14, 2024Updated last year
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Nov 11, 2014Updated 11 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- MITRE ATT&CK Framework compliance dashboard and correlation searches that works with Splunk Enterprise Security and ES Content Update☆30Nov 7, 2025Updated 3 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year