cisagov / cool-assessment-terraform
Terraform to deploy an assessment environment to the COOL
☆14Updated 3 weeks ago
Alternatives and similar repositories for cool-assessment-terraform:
Users that are interested in cool-assessment-terraform are comparing it to the libraries listed below
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆58Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- ☆21Updated 3 years ago
- ☆12Updated 4 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 9 months ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 11 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 10 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆49Updated 8 months ago
- Collection of useful Canary tools☆77Updated last week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆69Updated 2 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆15Updated 3 years ago
- ☆58Updated last year
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- Penguin OS Forensic (or Flight) Recorder☆39Updated 2 months ago
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- A CALDERA plugin☆26Updated 7 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆26Updated 8 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated 3 weeks ago
- Qemuno Framework☆24Updated 2 years ago