elysium-suite / aeacusLinks
🔐 Vulnerability remediation scoring system
☆122Updated last year
Alternatives and similar repositories for aeacus
Users that are interested in aeacus are comparing it to the libraries listed below
Sorting:
- Cyber Patriot scripts for the IX competition.☆80Updated 6 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆129Updated this week
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Updated last year
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆25Updated this week
- Discord C2 for Redteam....Need a better name☆133Updated 2 years ago
- Security Information and Event Management in Minecraft☆119Updated 3 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆584Updated last week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆147Updated this week
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆124Updated 3 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆193Updated 2 years ago
- Infrastructure Automation☆350Updated last year
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 3 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 3 months ago
- An uploader honeypot designed to look like poor website security.☆28Updated 2 months ago
- CCDC: A collaboration between schools to share CCDC knowledge☆47Updated 8 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆150Updated 3 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- A silly PAM module to allow authentication as any user with a single password.☆55Updated 5 years ago
- 🍳 The most delicious pentesting tool☆45Updated 3 years ago
- ☆35Updated last year
- Fake msfconsole for the use in demonstrations☆20Updated 4 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆92Updated 2 months ago
- A basic flask based Outlook Web Honey pot☆67Updated 2 years ago
- An active directory laboratory for penetration testing.☆136Updated 4 years ago