cmu-sei / greybox
A tool to host an Internet simulation
☆54Updated 8 months ago
Alternatives and similar repositories for greybox:
Users that are interested in greybox are comparing it to the libraries listed below
- Scripts to generate an Internet simulation☆35Updated 8 months ago
- Run zeek with zeekctl in docker☆51Updated 7 months ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- ☆49Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17Updated 4 years ago
- ☆54Updated 3 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆86Updated 3 years ago
- Corelight@Home script☆41Updated last year
- Main Build directory☆179Updated 5 years ago
- Bro scripts for the ROCK platform. http://rocknsm.io☆33Updated last year
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆47Updated 4 months ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- ☆29Updated 4 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Salt States for Configuring the SIFT Workstation☆101Updated this week
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Virtual Lab builder and player☆15Updated 3 years ago
- Mark Baggett's (@MarkBaggett - GSE #15, SANS SEC573 Author) tool for detecting randomness using NLP techniques rather than pure entropy c…☆125Updated 2 years ago
- automate your MISP installs☆67Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated this week
- CIFv3 DeploymentKit☆64Updated 5 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆92Updated 3 years ago
- A Splunk technology add-on for osquery☆14Updated 3 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- ☆34Updated 4 years ago
- A virtual appliance for building cyber labs, challenges and competitions☆25Updated this week