Scripts to generate an Internet simulation
☆36Aug 6, 2024Updated last year
Alternatives and similar repositories for topgen
Users that are interested in topgen are comparing it to the libraries listed below
Sorting:
- Virtual Lab builder and player☆15Aug 25, 2021Updated 4 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆29Mar 19, 2024Updated last year
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- [Fork] PowerSploit - A PowerShell Post-Exploitation Framework☆23Dec 27, 2022Updated 3 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated 2 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Set of tools for meshtastic network visualization and analysis using a graph theory library☆16Feb 28, 2025Updated last year
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- SSID logger - an Android app for position tracking, target to logging without GPS/network access and low battery usage☆10Sep 18, 2015Updated 10 years ago
- ☆10Jul 26, 2020Updated 5 years ago
- A Python version of the Blueprints property graph model interface by tinkerpop☆16Jan 21, 2022Updated 4 years ago
- Platform for sharing complex information about security forces. Powers WhoWasInCommand.com☆10Mar 1, 2024Updated 2 years ago
- SparkFun Analog to Digital Stereo Converter Breakout - PCM1803A☆10Mar 9, 2015Updated 10 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- The Crowdsignal plugin for WordPress☆15Updated this week
- post-quantum email encryption with CodeCrypt☆11Feb 23, 2018Updated 8 years ago
- Tactical Observation of RF GNSS Interference☆14Jun 25, 2020Updated 5 years ago
- Don't let *them* read your mail. Encrypt it now.☆18Jun 13, 2018Updated 7 years ago
- ☆11Apr 22, 2022Updated 3 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 2 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Workers-Framework: A simpler way to MultiTask in MicroPython☆12Jan 11, 2023Updated 3 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- ☆11Feb 10, 2026Updated 3 weeks ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago
- Part 1 of building an SMS voting app using Node.js☆37Mar 20, 2014Updated 11 years ago