llevier / vigrid
Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualize entire networks not visible between them. Vigrid adds industrial cloning. clientless console accesses. snapshots. unlimited scalability. standalone or infrastructure and cloud designs.
☆23Updated last month
Alternatives and similar repositories for vigrid:
Users that are interested in vigrid are comparing it to the libraries listed below
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 2 months ago
- A web scraper to create MISP events and reports☆14Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- create a "simulated internet" cyber range environment☆15Updated 2 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 3 weeks ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Scripts to deploy and update MISP in air-gapped environments☆17Updated last week
- Hashes of infamous malware☆25Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 6 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated last week
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆25Updated 7 months ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- DEbian Cve REproducer Tool☆22Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆31Updated 11 months ago
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆39Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year