elysium-suite / aeacusLinks
🔐 Vulnerability remediation scoring system
☆128Updated 2 years ago
Alternatives and similar repositories for aeacus
Users that are interested in aeacus are comparing it to the libraries listed below
Sorting:
- Cyber Patriot scripts for the IX competition.☆85Updated 6 years ago
- This contains the public CCDC materials for Cyber@UCR.☆37Updated 2 years ago
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated last week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆159Updated 2 months ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated 10 months ago
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆27Updated 3 weeks ago
- Discord C2 for Redteam....Need a better name☆141Updated 2 years ago
- A security competition scoring system built on the Elastic stack.☆41Updated 3 weeks ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆137Updated 9 months ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆196Updated 3 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆126Updated 3 years ago
- ☆133Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- ☆35Updated 2 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Infrastructure Automation☆359Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 9 months ago
- A collection of write-ups and solutions for Cyber FastTrack Spring 2021.☆48Updated 4 years ago
- Tools for investigating Log4j CVE-2021-44228☆94Updated 4 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆32Updated 9 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated this week
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆646Updated this week
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Automated security lab provisioning☆86Updated last week
- 🍳 The most delicious pentesting tool☆45Updated 4 years ago
- Automate writeup for vulnerable machines.☆40Updated 2 years ago