cmu-sei / TopoMojo
A simple virtual lab builder/player
☆30Updated last week
Alternatives and similar repositories for TopoMojo:
Users that are interested in TopoMojo are comparing it to the libraries listed below
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆25Updated last week
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 2 years ago
- Web application to create indexes for GIAC certification examinations.☆136Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 2 months ago
- ☆54Updated 3 years ago
- ☆23Updated 4 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 3 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- MITRE Shield website☆19Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- ☆63Updated last month
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- ☆77Updated 5 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated 3 weeks ago
- Cisco Orbital - Osquery queries by Talos☆131Updated 7 months ago
- The latest pyWars client for the SEC573 class☆44Updated 3 weeks ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- ☆32Updated last year
- A CALDERA plugin☆26Updated 8 months ago
- Defensive Origins Training Schedule☆38Updated last year
- Scripts to generate an Internet simulation☆34Updated 7 months ago
- Sample files for Control Things Platform☆38Updated 11 months ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆91Updated 3 years ago
- ☆49Updated last year
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆80Updated last year