mibeh / thunderdome
A purple team oriented cyber range deployed in AWS with Terraform
☆12Updated 4 years ago
Alternatives and similar repositories for thunderdome:
Users that are interested in thunderdome are comparing it to the libraries listed below
- ☆29Updated 4 years ago
- My Jupyter Notebooks☆36Updated last month
- Python library for threat intelligence☆86Updated 3 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A CALDERA plugin☆26Updated 9 months ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- ☆39Updated 4 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- CSIRT Jump Bag☆26Updated last year
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- ☆47Updated 2 weeks ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Logbook for Digital Forensics and Incident Response☆50Updated 9 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 months ago
- Public Landing Page☆16Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- ☆77Updated 5 years ago
- DShield Sensor Log Collection with ELK☆27Updated this week
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- ☆54Updated 3 years ago