Virtual Lab builder and player
☆15Aug 25, 2021Updated 4 years ago
Alternatives and similar repositories for TopoMojo-v1
Users that are interested in TopoMojo-v1 are comparing it to the libraries listed below
Sorting:
- Scripts to generate an Internet simulation☆36Aug 6, 2024Updated last year
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆29Mar 19, 2024Updated last year
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated 2 months ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Intel® Generic Implementation of LAGraph* for Go*☆10Feb 23, 2026Updated 2 weeks ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- A portable Go module for iSCSI operations.☆11Feb 23, 2026Updated 2 weeks ago
- SparkFun Analog to Digital Stereo Converter Breakout - PCM1803A☆10Mar 9, 2015Updated 11 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 2 years ago
- Scoring engine for cyber defense competitions☆10Jan 30, 2022Updated 4 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Workers-Framework: A simpler way to MultiTask in MicroPython☆12Jan 11, 2023Updated 3 years ago
- Writing CUDA code in Python with the help of Numba. Some example code.☆10Jan 15, 2024Updated 2 years ago
- Interconnect Electronic Medical Records systems to each other and to other systems☆25Jan 25, 2017Updated 9 years ago
- Speak raspberry pi`s ip address.☆10Oct 6, 2016Updated 9 years ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated 3 weeks ago
- CLI program for automating the setup, configuration, and use of cybersecurity solutions☆50Feb 12, 2023Updated 3 years ago
- Expandable Defensive Cyber Operations Platform☆44Sep 28, 2022Updated 3 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- WebGen Vertically Integrated Project☆10Oct 29, 2025Updated 4 months ago
- Asynchronous API over asynchronous tasks samples - Celery, Redis, Flask, Flask-RESTPlus, Jobtastic☆10Sep 13, 2022Updated 3 years ago
- This guide helps you create an automated Earth Observation pipeline on AWS using S3 data delivery.☆10Feb 19, 2025Updated last year
- Harden Kasm Workspaces deployments with DISA STIGs☆18Nov 17, 2025Updated 3 months ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 3 weeks ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Examples of security scenarios in IMUNES☆15Sep 26, 2018Updated 7 years ago
- Import Bro logs from SecurityOnion into Logstash☆15Nov 10, 2015Updated 10 years ago
- Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace☆24Jul 19, 2023Updated 2 years ago