CyRIS: Cyber Range Instantiation System
☆110Dec 19, 2024Updated last year
Alternatives and similar repositories for cyris
Users that are interested in cyris are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆26Updated this week
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- The Open-Source AWS Cyber Range☆494Aug 16, 2020Updated 5 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Nov 2, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆45Jul 31, 2022Updated 3 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆674Mar 22, 2026Updated last week
- create a "simulated internet" cyber range environment☆18Jan 28, 2026Updated 2 months ago
- ☆41May 16, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated 2 months ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆401Feb 27, 2024Updated 2 years ago
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆164May 11, 2020Updated 5 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,460Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Feb 2, 2022Updated 4 years ago
- ☆123Jan 27, 2022Updated 4 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- CTF website frontend for SecGen☆21Aug 11, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- ☆1,091May 1, 2019Updated 6 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆36Jul 10, 2017Updated 8 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago