cmu-sei / TopoMojo
A simple virtual lab builder/player
☆30Updated 2 weeks ago
Alternatives and similar repositories for TopoMojo:
Users that are interested in TopoMojo are comparing it to the libraries listed below
- an awesome list of active defense resources☆116Updated 4 years ago
- ☆32Updated last year
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago
- My Jupyter Notebooks☆36Updated 9 months ago
- ☆54Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- Automating Security Detection Engineering, published by Packt☆52Updated 3 months ago
- Identify Azure blobs using a wordlist of account name and container name strings☆32Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆47Updated 9 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆115Updated last year
- The latest pyWars client for the SEC573 class☆43Updated last year
- A system that creates a bogus web structure to entrap and delay web scanners☆56Updated 3 years ago
- The PoLRBear Project☆35Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- My conference presentations☆66Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Scripts to generate an Internet simulation☆34Updated 5 months ago
- Script samples from the book Pentesting Azure Applications (2018, No Starch Press)☆88Updated 6 years ago
- Scapy packet fragment reassembly engines☆34Updated 4 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 11 months ago
- Open Threat Hunting Framework☆105Updated last year
- Defensive Origins Training Schedule☆37Updated last year
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆40Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Cloud Templates and scripts to deploy mordor environments☆128Updated 3 years ago
- Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.☆30Updated last month
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆175Updated 9 months ago