redteam-project / cyber-range-scenarios
Training scenarios for cyber ranges
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for cyber-range-scenarios
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- Standardizing Security Titles☆13Updated last year
- Automated Static Analysis Framework☆10Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Kibana app for RedELK☆16Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆15Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 2 weeks ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆16Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated last week
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆12Updated 2 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- ☆19Updated 4 years ago
- parsers to make life easier☆12Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago