Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Chef, Puppet, SaltStack, DSCv2, DSCv3.
☆20Jul 21, 2025Updated 8 months ago
Alternatives and similar repositories for CMLab
Users that are interested in CMLab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated 11 months ago
- Rsources that are publicly available, these resources are linked to the SANS SEC598 Class☆24Mar 16, 2026Updated last week
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- ☆12Feb 15, 2024Updated 2 years ago
- Create a MS Word index file from PowerPoint notes and slides☆46Sep 6, 2025Updated 6 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆23Nov 11, 2025Updated 4 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Jan 30, 2024Updated 2 years ago
- CTFs On Demand☆13Mar 23, 2025Updated last year
- ☆29Jan 15, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Cybersecurity Architects Handbook, published by Packt☆27Mar 27, 2024Updated last year
- Cloud Security Tools☆16Aug 17, 2020Updated 5 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- This CloudWatch Events rule Lambda function evaluates AWS API calls that change Amazon EC2 security group ingress rules. The function fla…☆27Jan 14, 2026Updated 2 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆94Updated this week
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Github profile☆21Feb 2, 2026Updated last month
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆24Jun 14, 2023Updated 2 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆22Apr 16, 2021Updated 4 years ago
- BlackBerry Threat Research & Intelligence☆100Oct 20, 2023Updated 2 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- API Testing and Development with Postman, Second Edition☆17Jun 18, 2024Updated last year
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- macOS Artifacts☆33Mar 2, 2025Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆78Mar 7, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆16Oct 24, 2025Updated 5 months ago
- Disposable and resilient red team infrastructure with Terraform☆278Feb 1, 2019Updated 7 years ago
- ☆12May 19, 2025Updated 10 months ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆95Jun 20, 2019Updated 6 years ago