enricorusso / CRACKLinks
Cyber Range Automated Construction Kit
☆14Updated 4 years ago
Alternatives and similar repositories for CRACK
Users that are interested in CRACK are comparing it to the libraries listed below
Sorting:
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆20Updated 6 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Updated 5 years ago
- CyRIS: Cyber Range Instantiation System☆101Updated 6 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆31Updated 3 years ago
- ☆34Updated 4 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- Open source training materials for law-enforcement and organisations interested in DFIR.☆59Updated 3 weeks ago
- ☆51Updated 6 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last year
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- MITRE Shield website☆19Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Create complex tools execution Workflows for working together☆22Updated 3 years ago
- My Jupyter Notebooks☆36Updated 3 months ago
- For storing of the volumes☆4Updated 5 years ago
- Structured Threat Intelligence Graph☆95Updated 2 months ago
- Ansible role that configures a host to be a target in a cyber range☆15Updated 6 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- A CALDERA plugin for autonomous incident response☆26Updated last month
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆52Updated 3 months ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- Web application to create indexes for GIAC certification examinations.☆143Updated 2 years ago
- This repository maintains the SaltStack state files for the REMnux distro.☆48Updated this week
- Home to the ActorTrackr source code☆29Updated 7 years ago