crond-jaist / cylms
CyLMS: Cybersecurity Training Support for LMS
☆16Updated 4 months ago
Alternatives and similar repositories for cylms:
Users that are interested in cylms are comparing it to the libraries listed below
- CyTrONE: Integrated Cybersecurity Training Framework☆82Updated last month
- EXIST is a web application for aggregating and analyzing cyber threat intelligence.☆151Updated 2 years ago
- 高対話型ハニーポット☆27Updated 6 years ago
- CyRIS: Cyber Range Instantiation System☆100Updated 4 months ago
- Real-time Packet Observation Tool☆39Updated last year
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- osint_tools_security_auditing☆153Updated 8 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆56Updated 10 years ago
- R-CSIRT Linux Triage tool☆38Updated 6 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- vulnerable web application for training☆57Updated last year
- Munk - Visualize Splunk Architecture in Maltego☆13Updated 10 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- Maltego Transforms for threat_note☆11Updated 9 years ago
- 簡単に構築可能で、シンプルな機能で動作を把握しやすくした、サーバ側低対話型の入門用 Web ハニーポット。☆79Updated 4 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Updated 7 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆81Updated 9 years ago
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- A Pictorial Book of Tor Hidden Services.☆23Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- A quick and dirty PCAP parser that helps you identify who your applications are sending sensitive data to without encryption.☆106Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Updated 8 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 8 years ago
- ☆45Updated 8 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- This is a sample approach of data analysis in security scene.☆18Updated 6 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆13Updated 7 years ago