cisagov / cool-assessment-terraform
Terraform to deploy an assessment environment to the COOL
☆16Updated this week
Alternatives and similar repositories for cool-assessment-terraform:
Users that are interested in cool-assessment-terraform are comparing it to the libraries listed below
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆25Updated last year
- a port made of honey for blocking people☆13Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆45Updated 2 weeks ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- A CALDERA plugin☆26Updated 9 months ago
- Defensive Origins Training Schedule☆38Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆30Updated 2 weeks ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- ☆29Updated 4 years ago
- Collection of useful Canary tools☆78Updated 2 weeks ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year