ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices
☆22Apr 23, 2019Updated 6 years ago
Alternatives and similar repositories for alpaca
Users that are interested in alpaca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- CyRIS: Cyber Range Instantiation System☆110Dec 19, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆26Apr 6, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆17Jun 29, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆23Jan 23, 2024Updated 2 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Simple electron app for testing the Gamepad API.☆28Feb 21, 2018Updated 8 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- EPSS(Exploit Prediction Scoring System) API client☆20Oct 30, 2025Updated 5 months ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Tampermonkey script to allow custom playback speeds in YouTube site☆10Dec 4, 2024Updated last year
- Download Spotify playlists from YouTube with albumart and meta-tags☆11Oct 24, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Aug 29, 2025Updated 7 months ago
- Offensive Security & Red Teaming Labs and Projects☆26Aug 26, 2025Updated 7 months ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆17Nov 11, 2024Updated last year
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- All statistical models / machine learning / computer vision / financial models / NLP / PySpark / python techniques / library tutorials ca…☆11Nov 26, 2022Updated 3 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- Store Fly app logs locally.☆13Nov 13, 2022Updated 3 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆12Jun 9, 2020Updated 5 years ago
- Cyber Common Technical Core Public Mirror☆13Dec 17, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Apr 10, 2019Updated 7 years ago
- Master Kali Linux, Excel in Offensive Security☆34Jun 15, 2025Updated 9 months ago
- ☆18Feb 25, 2024Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆23Mar 5, 2026Updated last month
- The Open-Source AWS Cyber Range☆494Aug 16, 2020Updated 5 years ago
- Boyer-Moore-MagicLen, a fast string search algorithm implemented in Rust.☆13Dec 13, 2025Updated 4 months ago