cisagov / LudusLinks
Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.
☆74Updated last year
Alternatives and similar repositories for Ludus
Users that are interested in Ludus are comparing it to the libraries listed below
Sorting:
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆131Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated this week
- ☆270Updated 3 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Retired TrustedSec Capabilities☆248Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆147Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆140Updated 3 weeks ago
- A collection of tools, scripts and personal research☆152Updated this week
- ☆163Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆269Updated last year
- Baseline a Windows System against LOLBAS☆69Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆318Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 9 months ago
- All kinds of tiny shells☆65Updated 2 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 8 months ago
- ☆227Updated 6 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆127Updated 3 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆163Updated 3 weeks ago
- ☆41Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Updated 2 years ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆37Updated last year
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆34Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆165Updated last year
- ☆173Updated 5 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆336Updated 3 months ago
- AppLocker Policy Generator☆25Updated 3 months ago