Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.
☆77Mar 7, 2024Updated last year
Alternatives and similar repositories for Ludus
Users that are interested in Ludus are comparing it to the libraries listed below
Sorting:
- An azure devops tool for moar automation :D☆19Dec 8, 2022Updated 3 years ago
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Jul 27, 2023Updated 2 years ago
- some config files☆14Feb 23, 2026Updated last week
- ☆31Feb 28, 2025Updated last year
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Feb 27, 2026Updated last week
- ☆66Sep 1, 2023Updated 2 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆20Jul 21, 2025Updated 7 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆23Jun 22, 2021Updated 4 years ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆148Dec 21, 2025Updated 2 months ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆26Feb 27, 2026Updated last week
- Go rewrite of the simple Clay UI, for science. Readability and performance prioritized.☆35Jan 6, 2026Updated 2 months ago
- Qcow2 image builder for OpenBSD☆33Dec 24, 2025Updated 2 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- ☆58Dec 10, 2025Updated 2 months ago
- Windows Post Install script written in PowerShell☆26Jul 17, 2025Updated 7 months ago
- ☆26Apr 1, 2022Updated 3 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Indirect Syscall with TartarusGate Approach in Go☆135Jul 8, 2025Updated 7 months ago
- ☆110May 14, 2018Updated 7 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- CyRIS: Cyber Range Instantiation System☆110Dec 19, 2024Updated last year
- ☆128Mar 1, 2023Updated 3 years ago
- hentai game manager, mostly for f95, but might add other sites later☆11Nov 4, 2025Updated 4 months ago
- Hacks through Khan Academy lessons☆14Dec 27, 2023Updated 2 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 2 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago