A purple team oriented cyber range deployed in AWS with Terraform
☆12Jun 8, 2020Updated 5 years ago
Alternatives and similar repositories for thunderdome
Users that are interested in thunderdome are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆22Apr 23, 2019Updated 6 years ago
- File attribute changer library in go☆12Jan 26, 2024Updated 2 years ago
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- 📊 A personal side project with Strava API to upload and analyze cycling training data using Python☆13Feb 26, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CyRIS: Cyber Range Instantiation System☆110Dec 19, 2024Updated last year
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Nov 2, 2022Updated 3 years ago
- A CALDERA plugin☆26Mar 18, 2026Updated last week
- Python 2 Module of the Week☆19Jan 30, 2021Updated 5 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- DCZia DC31 Badge☆15Jul 12, 2025Updated 8 months ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- Security Operation Center Lab☆20Oct 8, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Custom-built cybersecurity labs on your Google Cloud Project☆19Sep 11, 2024Updated last year
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆22Jan 23, 2024Updated 2 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- The Open-Source AWS Cyber Range☆493Aug 16, 2020Updated 5 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Jun 4, 2019Updated 6 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- Simple electron app for testing the Gamepad API.☆28Feb 21, 2018Updated 8 years ago
- Ansible Playbooks for SimeonOnSecurity's STIG Scripts☆15Jul 26, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Apr 21, 2022Updated 3 years ago
- ☆10Sep 10, 2021Updated 4 years ago
- ☆23Jan 2, 2023Updated 3 years ago
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆40Apr 5, 2024Updated last year
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Apr 26, 2025Updated 11 months ago
- ☆14Jul 21, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Content Security Policy Generator, Powered by RapidSec☆16Feb 28, 2021Updated 5 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆17Jan 29, 2025Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆52Updated this week
- DAO in a box☆12Jun 15, 2023Updated 2 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago