StetsonMathCS / alpaca
ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices
☆19Updated 5 years ago
Alternatives and similar repositories for alpaca:
Users that are interested in alpaca are comparing it to the libraries listed below
- Cyber Range Automated Construction Kit☆14Updated 4 years ago
- CyRIS: Cyber Range Instantiation System☆99Updated 2 months ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Updated 4 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆99Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Analyst Unknown Cyber Range - a micro web service framework☆26Updated last year
- Ansible role that configures a host to be a target in a cyber range☆15Updated 5 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Scripts and other tools to helps parse data or gather information☆65Updated 2 years ago
- A CALDERA plugin☆74Updated 3 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆176Updated 9 months ago
- ☆15Updated 2 months ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 3 years ago
- Detection of obfuscated Powershell commands☆54Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆99Updated last week
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Updated last year
- ☆34Updated 4 years ago
- Three datasets to practice Threat Hunting against.☆42Updated last year
- Sigma Detection Rule Repository☆87Updated 4 years ago
- DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆35Updated 5 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆78Updated last year
- ☆77Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆79Updated 3 years ago