cmu-sei / TopoMojo-v1Links
Virtual Lab builder and player
☆15Updated 3 years ago
Alternatives and similar repositories for TopoMojo-v1
Users that are interested in TopoMojo-v1 are comparing it to the libraries listed below
Sorting:
- Scripts to generate an Internet simulation☆35Updated 10 months ago
- A tool to host an Internet simulation☆54Updated last month
- Corelight@Home script☆41Updated last year
- Recon Hunt Queries☆77Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆47Updated 6 months ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Updated 4 years ago
- ☆35Updated 4 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- ☆29Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago
- ☆54Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- FRAC and RIFT☆17Updated 6 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Public Landing Page☆16Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Updated 4 years ago
- ☆49Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- ☆77Updated 5 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆59Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- automate your MISP installs☆68Updated 4 years ago