Ansible role that configures a host to be a target in a cyber range
☆15Mar 17, 2019Updated 6 years ago
Alternatives and similar repositories for cyber-range-target
Users that are interested in cyber-range-target are comparing it to the libraries listed below
Sorting:
- ALPACA: A tool for building dynamic cyber ranges from procedurally-generated vulnerability lattices☆22Apr 23, 2019Updated 6 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- (MIRROR) Deployment and maintenance tool for Cyber Ranges. Core components are salt, openstack, and ceph.☆26Feb 27, 2026Updated last week
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- Cobaltstrike Aggressor Scripts☆28May 1, 2017Updated 8 years ago
- bctx is a tool for packing and uploading docker build context.☆12Jul 6, 2025Updated 8 months ago
- The Scorebot Engine is a platform that allows scoring, host checking and other cool stuff☆10Nov 10, 2024Updated last year
- Osmocom implementation of the 3GPP Serving GPRS Support Node (SGSN); mirrored from https://gitea.osmocom.org/cellular-infrastructure/osmo…☆14Feb 11, 2026Updated 3 weeks ago
- Searches for a contiguous array of bytes determined by a wild-carded pattern☆13Feb 3, 2021Updated 5 years ago
- ☆12Updated this week
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Small tutorial example of an AWS Lambda custom runtime in Rust☆10Oct 25, 2020Updated 5 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Osmocom Cell Broadcast Centre (CBC); mirror of https://git.osmocom.org/osmo-cbc☆15Feb 19, 2026Updated 2 weeks ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Quran:plain text and linguistic annotations☆10Oct 10, 2025Updated 4 months ago
- ☆13Apr 16, 2020Updated 5 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- Store Fly app logs locally.☆13Nov 13, 2022Updated 3 years ago
- ysoserial for 1nhann☆11Sep 26, 2022Updated 3 years ago
- This is a v2 version of my first IPMI script, but instead of hardcoding if statements this v2 uses a map function to map a temperature ra…☆11May 13, 2021Updated 4 years ago
- Java安全,漏洞分析/挖掘/利用☆14Mar 14, 2023Updated 2 years ago
- Create dozens/hundreds/thousands/millions of random examples based on a pest grammar (PEG). It can be used for generate string/structured…☆15Jun 8, 2021Updated 4 years ago
- Version of Cvapp as used on NeuroMorpho.org. Based on Robert Cannon's initial implementation.☆16Jul 1, 2024Updated last year
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Enterprise Security Response Center Development Framework☆11Jan 2, 2017Updated 9 years ago
- burpsuite 渗透测试☆13Aug 5, 2014Updated 11 years ago
- A compiler for Pseudocode written in python☆14Apr 30, 2019Updated 6 years ago
- A collection of malware that we use for testing and training☆12Nov 11, 2020Updated 5 years ago
- 收集的电子书☆13Feb 25, 2016Updated 10 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Detect bots/crawlers/spiders via user-agent string☆13Feb 22, 2026Updated last week
- Automatic Arabic diacritics restoration tool.☆18Aug 12, 2021Updated 4 years ago
- ☆21Feb 18, 2025Updated last year
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated last year