☆62Jun 18, 2025Updated 10 months ago
Alternatives and similar repositories for Building-a-Cyber-Fortress-SOC-Lab-for-Attack-Defense-Simulation
Users that are interested in Building-a-Cyber-Fortress-SOC-Lab-for-Attack-Defense-Simulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆42Jun 10, 2025Updated 10 months ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- ☆31May 31, 2022Updated 3 years ago
- ☆12Oct 15, 2024Updated last year
- Baseline a Windows System against LOLBAS☆74Feb 2, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My home Kubernetes cluster, managed by flux☆19May 2, 2026Updated last week
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- ☆16Jul 8, 2024Updated last year
- This project automates SOC workflows using Wazuh, Shuffle, and TheHive. It involves setting up a Windows 10 client with Sysmon and Ubuntu…☆39Jun 7, 2024Updated last year
- ☆18Updated this week
- Exercise files for Projectsecurity Enterprise 101 Module.☆44Jan 9, 2025Updated last year
- ☆12Jun 4, 2025Updated 11 months ago
- ☆23Apr 20, 2026Updated 2 weeks ago
- ☆12Aug 23, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- Experiment in implementation of an instrumentation for American Fuzzy Lop using DynamoRIO☆15Jul 29, 2017Updated 8 years ago
- Security Blogs - A simple aggregator for security news/blog☆26Apr 29, 2026Updated last week
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- ☆74Apr 27, 2026Updated last week
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆26May 6, 2024Updated 2 years ago
- A Python3 CLI application that allows to upload articles written in Markdown to draft blog posts in Ghost☆11Apr 5, 2019Updated 7 years ago
- Tool to fuzz for interesting vhost.☆23Jan 8, 2025Updated last year
- ☆12Dec 31, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆19May 30, 2022Updated 3 years ago
- Quick SOC L1 ticket structure☆40Jun 20, 2019Updated 6 years ago
- This repo contains the installation guide and EFI files required to get a perfectly functional macOS hackintosh on your Lenovo Thinkbook …☆14Apr 20, 2026Updated 2 weeks ago
- Cyber threat intelligence tool suite.☆41Apr 3, 2025Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos☆20Jul 29, 2021Updated 4 years ago
- A tutorial and resources for exploit development learners☆10Jan 25, 2021Updated 5 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆15Jan 18, 2025Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of resources to build a information security team.☆16Feb 10, 2021Updated 5 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 10 months ago
- research tool for the analysis of malicious pdf documents. make sure to run the installer first to get all of the 3rd party dlls installe…☆23Sep 18, 2013Updated 12 years ago
- Awesome DNS Security is a curated list of tools, best practices, and resources focused on securing DNS infrastructure.☆22Oct 11, 2024Updated last year
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 5 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆13May 7, 2025Updated last year
- ☆70May 3, 2021Updated 5 years ago