This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.
☆34Apr 15, 2021Updated 5 years ago
Alternatives and similar repositories for CDAS
Users that are interested in CDAS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆13Mar 20, 2026Updated last month
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Research indicators and detection rules☆69Sep 20, 2023Updated 2 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 9 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- Practical Orientation Of MVISION EDR Query Language☆35Feb 10, 2023Updated 3 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14May 30, 2018Updated 7 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- epanetCPA is a MATLAB® toolbox for assessing the impacts of cyber-physical attacks on water distribution systems☆23Oct 7, 2020Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Apr 19, 2023Updated 3 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- ☆21Nov 19, 2025Updated 5 months ago
- ☆14Nov 10, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆61May 25, 2020Updated 5 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- A pointer scanner for Windows written in Rust☆19Dec 18, 2025Updated 4 months ago
- ☆19Mar 31, 2019Updated 7 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆30Aug 14, 2022Updated 3 years ago
- ☆15Oct 24, 2018Updated 7 years ago
- Zeek BACnet Parser - CISA ICSNPP☆23Nov 6, 2025Updated 5 months ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆12Dec 30, 2021Updated 4 years ago
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆163Oct 18, 2024Updated last year
- ☆11Nov 30, 2020Updated 5 years ago