redteam-project / cyber-range-scenariosView external linksLinks
Training scenarios for cyber ranges
☆15Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for cyber-range-scenarios
Users that are interested in cyber-range-scenarios are comparing it to the libraries listed below
Sorting:
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 2 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago
- A very vulnerable implementation of a GraphQL API.☆17Updated this week
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated 3 weeks ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 6 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- A tool for detecting sensitive data in code repositories☆17Dec 15, 2025Updated 2 months ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 6 years ago
- Τεκμηρίωση για τα επεισόδια της Άσκησης Κυβερνοάμυνας Πανόπτης 2016☆17Jun 7, 2016Updated 9 years ago
- ☆17Jul 14, 2021Updated 4 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- A tool that provides htop-like functionality for any point in time, utilizing the Spyderbat APIs☆23Mar 4, 2025Updated 11 months ago
- Various scripts to check for web applications, Linux OS etc vulnerabilities.☆20Jun 5, 2022Updated 3 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆19Aug 8, 2018Updated 7 years ago
- ☆23Feb 2, 2026Updated 2 weeks ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Simple golang shodan cli☆49Apr 1, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Dockerized version of Nexus IQ Server☆27Updated this week
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Mar 12, 2018Updated 7 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- ☆43Oct 27, 2022Updated 3 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago