ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices
☆22Apr 23, 2019Updated 7 years ago
Alternatives and similar repositories for alpaca
Users that are interested in alpaca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- CyRIS: Cyber Range Instantiation System☆111Dec 19, 2024Updated last year
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆26Updated this week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Packer configuration files for Windows 10☆15Aug 17, 2021Updated 4 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆146Nov 2, 2022Updated 3 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆34Sep 14, 2023Updated 2 years ago
- Defund the Police. With repository stars⭐ and forks🍴☆22Apr 28, 2026Updated last week
- ☆17Jun 29, 2020Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year
- State of vulnerabilties report☆11Feb 20, 2020Updated 6 years ago
- Stipple Image and TSP-Art Generator for Processing☆31Nov 10, 2012Updated 13 years ago
- Tampermonkey script to allow custom playback speeds in YouTube site☆10Dec 4, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A framework for building behaviour-driven tests in fluent Java.☆35Mar 27, 2020Updated 6 years ago
- Download Spotify playlists from YouTube with albumart and meta-tags☆11Oct 24, 2020Updated 5 years ago
- ☆16Aug 29, 2025Updated 8 months ago
- Offensive Security & Red Teaming Labs and Projects☆27Aug 26, 2025Updated 8 months ago
- ICS Security Labs☆39Mar 27, 2021Updated 5 years ago
- ☆22Feb 4, 2017Updated 9 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Framework for learning automotive embedded software architecture and cyber security☆15Sep 4, 2018Updated 7 years ago
- Scripts that I find useful for managing MongoDB☆19Dec 19, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆33Jun 27, 2022Updated 3 years ago
- Cyber Attack Management for Metasploit☆13Jun 7, 2014Updated 11 years ago
- Galvanize: Pure Rust CDB reader/writer☆18Jan 16, 2023Updated 3 years ago
- Store Fly app logs locally.☆13Nov 13, 2022Updated 3 years ago
- ☆12Apr 10, 2019Updated 7 years ago
- Master Kali Linux, Excel in Offensive Security☆34Jun 15, 2025Updated 10 months ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆24Mar 5, 2026Updated 2 months ago