enricorusso / CRACK
Cyber Range Automated Construction Kit
☆14Updated 4 years ago
Alternatives and similar repositories for CRACK:
Users that are interested in CRACK are comparing it to the libraries listed below
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆19Updated 5 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Updated 4 years ago
- CyRIS: Cyber Range Instantiation System☆99Updated 2 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated last month
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 weeks ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆31Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- My Jupyter Notebooks☆36Updated 10 months ago
- Global Security Database Tools☆42Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated 10 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- Adversary Emulation Planner☆38Updated 7 months ago
- an awesome list of active defense resources☆118Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- OWASP Foundation Web Respository☆28Updated 2 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Updated 5 years ago
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆9Updated 2 years ago
- Hands-On Network Forensics by Nipun Jaswal☆43Updated last year
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17Updated 4 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆49Updated 3 years ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- Scripts and other tools to helps parse data or gather information☆65Updated 2 years ago
- ☆34Updated 4 years ago
- ☆33Updated 3 years ago