cmu-sei / foundry-appliance
A virtual appliance for building cyber labs, challenges and competitions
☆22Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for foundry-appliance
- Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.☆30Updated last week
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆173Updated 6 months ago
- Scripts and other tools to helps parse data or gather information☆64Updated last year
- Defensive Origins Training Schedule☆36Updated 11 months ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆115Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆50Updated 3 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 8 months ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆66Updated 4 years ago
- Python library for threat intelligence☆80Updated 4 months ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- A packet capture visualizer for industrial control networks.☆48Updated 11 months ago
- The home of the BriMor Labs rdpieces Perl script that tries to rebuild parsed RDP Bitmap Cache images☆78Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆24Updated 6 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆91Updated 3 years ago
- President's Cup Cybersecurity Competition Challenges☆147Updated last month
- an awesome list of active defense resources☆113Updated 4 years ago
- Documentation site for Velociraptor☆37Updated last week
- The latest pyWars client for the SEC573 class☆43Updated last year
- Detection of obfuscated Powershell commands☆54Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆60Updated last year
- A simple virtual lab builder/player☆29Updated this week
- Scapy packet fragment reassembly engines☆34Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆67Updated last year
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆52Updated 3 years ago
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year