gacybercenter / kinetic
(MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.
☆26Updated 2 months ago
Alternatives and similar repositories for kinetic
Users that are interested in kinetic are comparing it to the libraries listed below
Sorting:
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last week
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 8 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- A web application to streamline the development of STIGs from SRGs☆74Updated 2 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆14Updated 4 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.☆42Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Expandable Defensive Cyber Operations Platform☆43Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- A ComplianceAsCode blog☆27Updated 3 weeks ago
- Please use https://github.com/veeral-patel/true-positive instead☆67Updated 2 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated 3 months ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆24Updated 4 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 3 weeks ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Updated 6 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 9 months ago