DSU-DefSec / DWAYNE-INATOR-5000
Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.
☆26Updated 2 months ago
Alternatives and similar repositories for DWAYNE-INATOR-5000:
Users that are interested in DWAYNE-INATOR-5000 are comparing it to the libraries listed below
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆24Updated last week
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆164Updated 3 weeks ago
- Retired TrustedSec Capabilities☆247Updated 5 months ago
- ☆120Updated last year
- ☆245Updated 11 months ago
- Tuoni☆95Updated 3 weeks ago
- Infrastructure Automation☆345Updated last year
- Automated security lab provisioning☆73Updated last month
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- ☆13Updated 2 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- Windows Malware Investigation Scripts & Docs☆81Updated 5 months ago
- Repo of RIT CCDC Team Scripts☆14Updated 3 years ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆123Updated 3 weeks ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆561Updated last week
- Scoring Engine for Red/White/Blue Team Competitions☆128Updated this week
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆250Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated last month
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆168Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆188Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆285Updated 10 months ago
- ☆41Updated 11 months ago
- A repository to share publicly available Velociraptor detection content☆156Updated this week
- Harness the power of Splunk for your investigations☆99Updated 3 weeks ago
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 3 weeks ago
- Takajō (鷹匠) is a Hayabusa results analyzer.☆115Updated this week
- Docker images of the Exegol project☆105Updated this week
- A security competition scoring system built on the Elastic stack.☆41Updated last year