cmu-sei / foundry-appliance
A virtual appliance for building cyber labs, challenges and competitions
☆23Updated this week
Alternatives and similar repositories for foundry-appliance:
Users that are interested in foundry-appliance are comparing it to the libraries listed below
- Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.☆33Updated this week
- A tool to host an Internet simulation☆53Updated 6 months ago
- Defensive Origins Training Schedule☆38Updated last year
- ☆15Updated 2 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆178Updated 10 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆221Updated 2 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆123Updated this week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated 2 weeks ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Tools for simulating threats☆181Updated last year
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆46Updated 3 months ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 10 months ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- ☆67Updated 2 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆157Updated last week
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- A system that creates a bogus web structure to entrap and delay web scanners☆57Updated 3 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆51Updated 3 years ago
- ☆34Updated 4 years ago
- A packet capture visualizer for industrial control networks.☆52Updated last year
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆205Updated last week