chipmanfu / Cyber-Range
create a "simulated internet" cyber range environment
☆16Updated this week
Alternatives and similar repositories for Cyber-Range:
Users that are interested in Cyber-Range are comparing it to the libraries listed below
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 3 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆40Updated last month
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ☆32Updated 2 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 10 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 9 months ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Updated 2 years ago
- ☆33Updated last year
- ☆21Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆23Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- Living off the False Positive!☆35Updated 3 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Bloodhound agent for Mythic☆18Updated 2 weeks ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 9 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆45Updated last month
- Baseline a Windows System against LOLBAS☆26Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 6 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- My Notes from Hugging Face AI Agents Course☆13Updated 2 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆16Updated 4 months ago