elysium-suite / aeacusLinks
🔐 Vulnerability remediation scoring system
☆125Updated 2 years ago
Alternatives and similar repositories for aeacus
Users that are interested in aeacus are comparing it to the libraries listed below
Sorting:
- Cyber Patriot scripts for the IX competition.☆85Updated 6 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆133Updated last month
- This contains the public CCDC materials for Cyber@UCR.☆37Updated last year
- A security competition scoring system built on the Elastic stack.☆41Updated last year
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated 8 months ago
- Discord C2 for Redteam....Need a better name☆135Updated 2 years ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆28Updated last week
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆136Updated 7 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆165Updated 7 months ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆196Updated 3 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆31Updated 8 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- A Discord bot for interaction with the CyberPatriot scoreboard☆116Updated last month
- Different cyberpatriot checklists and scripts I wrote☆57Updated 7 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆126Updated 3 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆625Updated last week
- Example reports from prior years of the Collegiate Penetration Testing Competition☆156Updated last month
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆387Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Automate writeup for vulnerable machines.☆41Updated 2 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- Infrastructure Automation☆357Updated last year
- ☆22Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- ☆192Updated last month