cisagov / Ludus
Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.
☆34Updated last year
Alternatives and similar repositories for Ludus:
Users that are interested in Ludus are comparing it to the libraries listed below
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- create a "simulated internet" cyber range environment☆15Updated last week
- A simple tool designed to create Atomic Red Team tests with ease.☆38Updated last week
- An Ansible collection that installs an SCCM deployment with optional configurations.☆72Updated 8 months ago
- Hybrid AD utilities for ROADtools☆72Updated last month
- All kinds of tiny shells☆58Updated 2 years ago
- ☆85Updated last week
- A tool to create randomly insecure file shares that also contain unsecured credential files☆36Updated 10 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 9 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- ☆46Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆74Updated 4 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆78Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆71Updated last year
- ☆139Updated 7 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Living Off the Foreign Land setup scripts☆65Updated 3 weeks ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆89Updated 10 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 9 months ago