elysium-suite / aeacusLinks
🔐 Vulnerability remediation scoring system
☆122Updated last year
Alternatives and similar repositories for aeacus
Users that are interested in aeacus are comparing it to the libraries listed below
Sorting:
- Cyber Patriot scripts for the IX competition.☆80Updated 6 years ago
- This contains the public CCDC materials for Cyber@UCR.☆35Updated last year
- Scoring Engine for Red/White/Blue Team Competitions☆129Updated this week
- Security Information and Event Management in Minecraft☆120Updated 3 years ago
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆149Updated 3 weeks ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆594Updated last month
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆195Updated 3 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 4 months ago
- A basic flask based Outlook Web Honey pot☆67Updated 2 years ago
- Some Unhinged Guy Made Another All-in-one Scoring Engine☆25Updated 3 weeks ago
- Discord C2 for Redteam....Need a better name☆134Updated 2 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆124Updated 3 years ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- ☆232Updated 2 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆150Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Updated last year
- An uploader honeypot designed to look like poor website security.☆28Updated 3 months ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆384Updated 3 years ago
- An active directory laboratory for penetration testing.☆137Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆135Updated 4 months ago
- ☆172Updated 2 weeks ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 4 months ago
- A PoC ransomware sample to test out your ransomware response strategy.☆210Updated 3 months ago
- Service uptime scoring engine for CCDC mock competitions. Written for DSU DefSec Club.☆26Updated 5 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆134Updated last year
- ☆23Updated 3 years ago