cisagov / cool-assessment-terraformLinks
Terraform to deploy an assessment environment to the COOL
☆16Updated last month
Alternatives and similar repositories for cool-assessment-terraform
Users that are interested in cool-assessment-terraform are comparing it to the libraries listed below
Sorting:
- A memorial site for Hackers and Infosec people who have passed☆137Updated 2 months ago
- Knowledge base on cybercriminal concealment techniques☆88Updated 7 months ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆182Updated 2 months ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Updated 5 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Collection of useful Canary tools☆91Updated last month
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆68Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 9 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- ☆190Updated 3 weeks ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated last week
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆72Updated last month
- Unleash the power of the Falcon Platform at the CLI☆133Updated 2 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆42Updated 2 years ago
- SANS Holiday Hack Challenge write-up template☆27Updated 2 years ago
- ☆168Updated 2 months ago
- Conference presentations☆60Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆143Updated 3 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆107Updated 2 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- ☆77Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- God Mode Detection Rules☆134Updated last year