redteam-project / cyber-range-target
Ansible role that configures a host to be a target in a cyber range
☆15Updated 6 years ago
Alternatives and similar repositories for cyber-range-target
Users that are interested in cyber-range-target are comparing it to the libraries listed below
Sorting:
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- C# User Simulation☆32Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 5 months ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated 10 months ago
- ☆34Updated 3 years ago
- Documentation for ROCK NSM☆26Updated 4 years ago
- Bro integration with osquery☆15Updated 2 years ago
- ☆32Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- ☆42Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- Old home of LimaCharlie, open source EDR☆30Updated last year
- OSSEM Modular☆27Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Terraform resources for building HTTP, DNS, phishing, and mail server red team infrastructure☆93Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago