enricorusso / CRACK
Cyber Range Automated Construction Kit
☆14Updated 4 years ago
Alternatives and similar repositories for CRACK:
Users that are interested in CRACK are comparing it to the libraries listed below
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆20Updated 6 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Updated 4 years ago
- CyRIS: Cyber Range Instantiation System☆100Updated 4 months ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last year
- CyCAT.org taxonomies☆14Updated 3 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Structured Threat Intelligence Graph☆91Updated 3 weeks ago
- ☆51Updated 3 years ago
- an awesome list of active defense resources☆120Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- A GUI/REST interface to find similarities in large sets (think: binaries). Based on ssdeep.☆19Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆116Updated 2 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- Various capabilities for static malware analysis.☆77Updated 7 months ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Simple yara rule manager☆66Updated 2 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆31Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆162Updated last month
- Hands-On Network Forensics by Nipun Jaswal☆46Updated last year
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆10Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- Set of Yara rules for finding files using magics headers☆137Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 7 months ago
- ☆33Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 years ago