cisagov / cool-assessment-terraformLinks
Terraform to deploy an assessment environment to the COOL
☆16Updated this week
Alternatives and similar repositories for cool-assessment-terraform
Users that are interested in cool-assessment-terraform are comparing it to the libraries listed below
Sorting:
- Collection of useful Canary tools☆91Updated this week
- CyHy Dashboard☆24Updated this week
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Lacus is a capturing system using playwright, as a web service.☆99Updated last week
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆84Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆169Updated this week
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- ☆77Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated 3 months ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆151Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Updated 6 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- SANS Holiday Hack Challenge write-up template☆28Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆173Updated 10 months ago
- an awesome list of active defense resources☆127Updated 5 years ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Updated this week
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Updated 3 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆70Updated last year
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Updated 5 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year