gacybercenter / kinetic
(MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.
☆27Updated last week
Alternatives and similar repositories for kinetic:
Users that are interested in kinetic are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A web application to streamline the development of STIGs from SRGs☆70Updated 3 weeks ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆13Updated 2 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Updated 5 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆67Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆17Updated 11 months ago
- Security Assessment Data Management and Analysis Tool☆38Updated 3 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 6 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 2 weeks ago
- ☆18Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated 3 weeks ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago
- A Darktrace CLI written in Python☆15Updated 5 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- ☆15Updated 3 years ago
- ☆16Updated 3 years ago
- A ComplianceAsCode blog☆27Updated this week
- ☆15Updated 3 years ago
- ☆48Updated this week
- ☆15Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 9 months ago
- ☆21Updated last year