redteam-project / cyber-range-target
Ansible role that configures a host to be a target in a cyber range
☆15Updated 5 years ago
Related projects: ⓘ
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 2 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 6 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆97Updated 6 years ago
- Old home of LimaCharlie, open source EDR☆29Updated last year
- C# User Simulation☆33Updated last year
- ☆40Updated 5 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated last year
- Cybersecurity Incidents Mind Maps☆32Updated 2 years ago
- A list of IOCs applicable to PoshC2☆23Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆42Updated 4 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- Automatic detection engineering technical state compliance☆49Updated 2 months ago
- A repository of Sysmon For Linux configuration modules☆14Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Automated detection rule analysis utility☆29Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- ☆37Updated this week
- Valhalla API Client☆62Updated last year
- ☆52Updated 5 years ago
- A YARA Rule Performance Measurement Tool☆58Updated 6 months ago
- OSSEM Modular☆27Updated 4 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- ☆28Updated 5 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆29Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago