elysium-suite / aeacusLinks
🔐 Vulnerability remediation scoring system
☆129Updated 2 years ago
Alternatives and similar repositories for aeacus
Users that are interested in aeacus are comparing it to the libraries listed below
Sorting:
- Cyber Patriot scripts for the IX competition.☆85Updated 6 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated last week
- A security competition scoring system built on the Elastic stack.☆41Updated last month
- Security Information and Event Management in Minecraft☆118Updated 3 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆196Updated 3 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- This contains the public CCDC materials for Cyber@UCR.☆37Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆142Updated 2 years ago
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆29Updated this week
- Notes, Slides, Comments and Commands on How to Win CCDC☆137Updated 10 months ago
- For when you want a computer to be done - without admin!☆312Updated 7 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆125Updated 3 years ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated 11 months ago
- Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam☆105Updated 4 years ago
- Cybersecurity scripts created and used during the AFA CyberPatriot VIII competition☆32Updated 9 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆167Updated 10 months ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- ☆239Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆386Updated 4 years ago
- CCDC: A collaboration between schools to share CCDC knowledge☆48Updated 8 years ago
- ☆35Updated 2 years ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆653Updated this week
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆160Updated 3 months ago
- An active directory laboratory for penetration testing.☆148Updated 5 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆330Updated 2 weeks ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- Tryhackme rooms & tools☆64Updated 5 years ago