Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them
☆29Feb 23, 2024Updated 2 years ago
Alternatives and similar repositories for purple-team-cloud-lab
Users that are interested in purple-team-cloud-lab are comparing it to the libraries listed below
Sorting:
- Security Lab☆13Jun 5, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- a tools for erp penetration testing☆16Dec 26, 2019Updated 6 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆57Feb 9, 2024Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- ☆28May 25, 2021Updated 4 years ago
- ☆68Mar 6, 2022Updated 3 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Oct 7, 2020Updated 5 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 7 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- Crane POAM Automation Tool (C-PAT™)☆15Feb 24, 2026Updated last week
- ☆83Jun 17, 2024Updated last year
- I will share my bug bounty tips here☆32Mar 6, 2023Updated 2 years ago
- Android Pentest Setup Environment☆30May 9, 2022Updated 3 years ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 2 months ago
- ☆11Jun 10, 2025Updated 8 months ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Sep 19, 2023Updated 2 years ago
- ☆39Mar 9, 2023Updated 2 years ago
- ☆138Jul 9, 2021Updated 4 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 2 months ago
- ☆14Jan 7, 2026Updated last month
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated 2 weeks ago
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Feb 19, 2026Updated last week
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Engineering Guidance and Standards for the Home Office☆21Updated this week
- Compliance-to-Policy (C2P) provides the framework to bridge the gap between compliance and policy administration in Go.☆24Updated this week
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year