CyTrONE: Integrated Cybersecurity Training Framework
☆88Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for cytrone
Users that are interested in cytrone are comparing it to the libraries listed below
Sorting:
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- A Python library for parsing, manipulating, and generating MAEC content.☆42Nov 16, 2020Updated 5 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- 基于k8s和django的快速生成容器的平台,支持webssh与webvnc连接,需 要安装guacamole服务,Cloud platform based on kubernetes and django, supports webssh and webvnc☆12Aug 28, 2024Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Jan 17, 2023Updated 3 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- SNIF ~ e2e TLS trust for IoT☆16Sep 7, 2024Updated last year
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 5 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- ☆23Oct 9, 2024Updated last year
- Analyzing Rig Exploit Kit☆49May 17, 2017Updated 8 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆45Jul 31, 2022Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- 鉴势-工控系统信息安全及态势感知系统☆18Jan 6, 2019Updated 7 years ago
- A logic-based enterprise network security analyzer☆137Jan 28, 2023Updated 3 years ago
- ☆25Mar 22, 2023Updated 2 years ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- gdbserver implementation on BitVisor☆25Nov 8, 2017Updated 8 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Autonomous Security Analysis and Penetration Testing☆25Dec 8, 2022Updated 3 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 8 months ago
- ☆35Mar 31, 2019Updated 6 years ago
- CIFv3 DeploymentKit☆64Apr 14, 2020Updated 5 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- ☆34Jan 22, 2025Updated last year
- Purple Team Security☆76Mar 24, 2022Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago