StetsonMathCS / alpaca
ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices
☆19Updated 5 years ago
Alternatives and similar repositories for alpaca:
Users that are interested in alpaca are comparing it to the libraries listed below
- Cyber Range Automated Construction Kit☆14Updated 4 years ago
- CyRIS: Cyber Range Instantiation System☆99Updated last month
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- A purple team oriented cyber range deployed in AWS with Terraform☆12Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated 11 months ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 3 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆174Updated 8 months ago
- Tool used to perform threat intelligence against packet data☆35Updated last week
- Cloud Templates and scripts to deploy mordor environments☆128Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 2 years ago
- Scripts and other tools to helps parse data or gather information☆65Updated 2 years ago
- ☆77Updated 5 years ago
- Analyst Unknown Cyber Range - a micro web service framework☆26Updated last year
- Tools to automate and/or expedite response.☆113Updated 6 months ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆124Updated 2 years ago
- Data Driven Threat Hunting on the RaspberryPi☆29Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated this week
- Compilation of resources to help with Adversary Simulation automation harness☆99Updated 4 years ago
- Hands-On Network Forensics by Nipun Jaswal☆41Updated last year
- ☆14Updated 3 months ago
- Converts Sigma detection rules to a Splunk alert configuration.☆108Updated 4 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago