Docker Container to deploy Mitre Caldera Automated Adversary Emulation System
☆26Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for docker-caldera
Users that are interested in docker-caldera are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of Mitre Caldera compatible emulation-plans☆14Feb 1, 2021Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Stamus Security Plat…☆13Jan 7, 2026Updated 3 months ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆26Jul 26, 2023Updated 2 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated 2 weeks ago
- MITRE ATT&CK Framework compliance dashboard and correlation searches that works with Splunk Enterprise Security and ES Content Update☆30Apr 2, 2026Updated last week
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆23Jun 3, 2019Updated 6 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- ☆54May 14, 2024Updated last year
- Fluentd output plugin that sends events to Amazon Kinesis Streams and Amazon Kinesis Firehose.☆13Apr 2, 2023Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆29Mar 19, 2024Updated 2 years ago
- bot which uses forms to do hotel and restaurant booking task☆14Aug 10, 2018Updated 7 years ago
- The Splunk Web Framework Toolkit☆12May 3, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- Small fuzzing library with an example script using it.☆21Feb 12, 2021Updated 5 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Repo for the "Exploring Messari's Crypto API" article☆10Dec 19, 2018Updated 7 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆64Apr 8, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆249Jun 19, 2024Updated last year
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 7 months ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago