Training scenarios for cyber ranges
☆15Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for cyber-range-scenarios
Users that are interested in cyber-range-scenarios are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 10 months ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Τεκμηρίωση για τα επεισόδια της Άσκησης Κυβερνοάμυνας Πανόπ της 2016☆16Jun 7, 2016Updated 9 years ago
- This is an intensive 24-week long boot camp program. Skills learned consist of Wireshark, Kali Linux, Metasploit, Burp Suite, Elk Stack, …☆19Apr 5, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Emulate the AWS IoT Button on a Raspberry Pi with a simple push button using this C++ sample☆10Sep 16, 2016Updated 9 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last week
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- A very vulnerable implementation of a GraphQL API.☆17Mar 13, 2026Updated 2 weeks ago
- ☆17Feb 16, 2024Updated 2 years ago
- Blockchain and Smart Contract basic code for "mining" myself !!!☆13Jun 6, 2022Updated 3 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 4 months ago
- bctx is a tool for packing and uploading docker build context.☆12Jul 6, 2025Updated 8 months ago
- Ansible playbooks for interacting with phpipam's API☆17Feb 6, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Nov 25, 2019Updated 6 years ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last month
- ☆10Jan 21, 2019Updated 7 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year