cmu-sei / TopoMojoLinks
A simple virtual lab builder/player
☆32Updated 2 weeks ago
Alternatives and similar repositories for TopoMojo
Users that are interested in TopoMojo are comparing it to the libraries listed below
Sorting:
- A system that creates a bogus web structure to entrap and delay web scanners☆65Updated 4 years ago
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated this week
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- Open Threat Hunting Framework☆121Updated 2 years ago
- ☆33Updated last year
- My Jupyter Notebooks☆36Updated 7 months ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago
- This is a repository for freq.py and freq_server.py☆211Updated 5 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆322Updated 7 months ago
- The latest pyWars client for the SEC573 class☆47Updated 7 months ago
- Industrial Control Systems Network Protocol Parsers☆181Updated 2 months ago
- SANS Slingshot Linux Distribution☆55Updated 5 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆33Updated last month
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆141Updated 3 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆241Updated 10 months ago
- Defensive Origins Training Schedule☆39Updated last year
- Let's obscure some IPv4 addresses☆37Updated 3 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆240Updated 7 months ago
- Tools for simulating threats☆196Updated 2 years ago
- Python module to interact with the MITRE attack framework via the MITRE API☆85Updated 7 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆28Updated last month
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆76Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
- ☆55Updated 4 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year