gacybercenter / kineticLinks
(MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.
☆26Updated last week
Alternatives and similar repositories for kinetic
Users that are interested in kinetic are comparing it to the libraries listed below
Sorting:
- Documentation for ROCK NSM☆26Updated 4 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- Please use https://github.com/veeral-patel/true-positive instead☆67Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- Ansible Playbook to install the ELK Stack☆43Updated 4 years ago
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆20Updated 6 years ago
- ☆54Updated 4 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ☆48Updated 3 weeks ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 9 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 10 months ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆24Updated 4 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- This is a repository that will be used to help create a process of a new kali vagrant box for hashicorp each week.☆42Updated 2 years ago
- Wazuh - Splunk App☆55Updated 9 months ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- ☆15Updated last year
- ☆20Updated 5 years ago
- damn simple honey pot☆17Updated 9 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Updated 3 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆14Updated 5 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- A ComplianceAsCode blog☆27Updated 2 months ago
- ☆15Updated 5 years ago