This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.
☆33Apr 15, 2021Updated 4 years ago
Alternatives and similar repositories for CDAS
Users that are interested in CDAS are comparing it to the libraries listed below
Sorting:
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Scripts to generate an Internet simulation☆36Aug 6, 2024Updated last year
- ☆14May 30, 2018Updated 7 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- Zeek BACnet Parser - CISA ICSNPP☆22Nov 6, 2025Updated 3 months ago
- OpenISMS is a tool for information security managers. The goal is to create one single tool for the governance of information security. T…☆20Jun 30, 2016Updated 9 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated 2 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Plugin to give CTFd the ability to manage Docker containers☆19Oct 10, 2017Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- A tool to host an Internet simulation☆63Apr 25, 2025Updated 10 months ago
- Industrial Hacking Simulator☆27Feb 21, 2026Updated last week
- Multi-Agent System for Automated Penetration Testing (MASAPT)☆30Dec 22, 2021Updated 4 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 8 months ago
- Research indicators and detection rules☆68Sep 20, 2023Updated 2 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- An open-source session replay tool for single-page applications that uses AI analysis, aggregated trends, and a RAG chatbot to help devel…☆11Jan 23, 2026Updated last month
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆30May 30, 2024Updated last year
- Awesome List for Security Standards☆31Jul 20, 2018Updated 7 years ago
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Function used for requesting and getting a PlayFab multiplayer server through an Azure Cloud Function☆12Jan 12, 2022Updated 4 years ago
- Meta-Reinforcement Learning with Policy Residual Representation☆11Aug 15, 2019Updated 6 years ago
- Practical Orientation Of MVISION EDR Query Language☆34Feb 10, 2023Updated 3 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago