This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.
☆33Apr 15, 2021Updated 4 years ago
Alternatives and similar repositories for CDAS
Users that are interested in CDAS are comparing it to the libraries listed below
Sorting:
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Updated this week
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Parse Chrome History and Downloads into TSV or TLN format☆16Sep 3, 2016Updated 9 years ago
- Research indicators and detection rules☆68Sep 20, 2023Updated 2 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Aug 24, 2019Updated 6 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Dec 4, 2024Updated last year
- Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly☆18Jun 26, 2018Updated 7 years ago
- Practical Orientation Of MVISION EDR Query Language☆34Feb 10, 2023Updated 3 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- Scripts to generate an Internet simulation☆37Aug 6, 2024Updated last year
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- ☆14May 30, 2018Updated 7 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Apr 19, 2023Updated 2 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- ☆14Nov 10, 2019Updated 6 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Plugin to give CTFd the ability to manage Docker containers☆19Oct 10, 2017Updated 8 years ago
- A pointer scanner for Windows written in Rust☆19Dec 18, 2025Updated 3 months ago
- Container building stuff☆16Mar 3, 2026Updated 2 weeks ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Zeek BACnet Parser - CISA ICSNPP☆22Nov 6, 2025Updated 4 months ago
- A virtual appliance for building cyber labs, challenges and competitions☆30Updated this week