ameng929's Stars
microsoft/CyberBattleSim
An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments.
zsdlove/Hades
Static code auditing system
devsecops/awesome-devsecops
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
Fortiphyd/GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
djformby/GRFICS
Graphical Realism Framework for Industrial Control Simulations
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Hackplayers/hackthebox-writeups
Writeups for HacktheBox 'boot2root' machines
apsdehal/awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
jkuemerle/RSA-2020-CTF
Materials and references for RSA 2020 talk "Everyone Can Play!"
praetorian-inc/purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
teoseller/osquery-attck
Mapping the MITRE ATT&CK Matrix with Osquery
nshalabi/ATTACK-Tools
Utilities for MITRE™ ATT&CK
mitre-attack/tram
Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.
euphrat1ca/Security-List
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与。
knownsec/VxPwn
VxWorks漏洞挖掘相关
dathlin/HslCommunication
A very popular industrial Internet of Things communication plug-in. Using this dll can be very convenient, stable, and fast to obtain data from PLC equipment of multiple brands, and also supports redis, mqtt, websocket, etc., which can let your data on the network Free transmission, reducing enterprise development costs.
StamusNetworks/SELKS
A Suricata based IDS/IPS/NSM distro
FSecureLABS/wePWNise
WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
mandiant/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandiant.com
mitre/caldera
Automated Adversary Emulation Platform
TryCatchHCF/DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
OWASP/Python-Honeypot
OWASP Honeypot, Automated Deception Framework.
OWASP/Nettacker
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
NozomiNetworks/tricotools
Triconex TriStation utilities and tools
WilliamJardine/SENAMI
Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS
MDudek-ICS/TRISIS-TRITON-HATMAN
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
ruped24/killchain
A unified console to perform the "kill chain" stages of attacks.
John-Lin/malware
This is a malware analysis project which expecte to generate snort rule via malicious network traffic
John-Lin/snortunsock
A Python listener to capture Snort event via the UNIX Socket output.
jasonish/py-idstools
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)