cmu-sei / TopoMojoLinks
A simple virtual lab builder/player
☆32Updated 2 weeks ago
Alternatives and similar repositories for TopoMojo
Users that are interested in TopoMojo are comparing it to the libraries listed below
Sorting:
- A system that creates a bogus web structure to entrap and delay web scanners☆65Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆116Updated last year
- Open Threat Hunting Framework☆120Updated 2 years ago
- My Jupyter Notebooks☆36Updated 7 months ago
- Web application to create indexes for GIAC certification examinations.☆146Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated last week
- Intrusion Detection Honeypots Book Code☆26Updated 5 years ago
- ☆55Updated 4 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- an awesome list of active defense resources☆126Updated 5 years ago
- ☆23Updated 5 years ago
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 6 months ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆72Updated 5 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆235Updated 6 months ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆139Updated 2 years ago
- A tool to host an Internet simulation☆59Updated 5 months ago
- Defensive Origins Training Schedule☆38Updated last year
- The PoLRBear Project☆35Updated 4 years ago
- President's Cup Cybersecurity Competition Challenges☆180Updated last month
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆321Updated 6 months ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆77Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- SANS Slingshot Linux Distribution☆54Updated 4 years ago
- This is a repository for freq.py and freq_server.py☆211Updated 5 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago