nccfsas
Attack simulation data
Contains publicly released information on simulated full-spectrum attacks on file systems and security protocols.
Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.
607 stars
36 watching
110 forks
Language: C
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A repository of publicly released information on cyber security incidents and threat intelligence | 475 |
| A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
| This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 284 |
| A proof-of-concept simulation framework demonstrating industrial control system security vulnerabilities and attack scenarios | 409 |
| A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| A Python library implementing a CF data model and providing tools for Earth Science data analysis | 129 |
| A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,951 |
| A comprehensive cyber adversary simulation platform for planning and conducting simulated attacks and exercises | 765 |
| Software designed to monitor Windows executable memory page changes to detect anomalies in system behavior | 28 |
| A platform for simulating and exploiting smart contract vulnerabilities in a controlled environment | 116 |
| An implementation-level vulnerability discovery tool for 5G networks | 526 |
| A tool for generating intentionally insecure cloud infrastructure for testing and auditing purposes | 666 |
| Generates encrypted HTA files to evade content inspection and sandboxing by using RC4 encryption and dynamic key fetching | 1,372 |
| An initiative to improve cloud native security by developing standards and best practices. | 2,104 |
| Analyzes and reports on the security configuration of a container environment | 106 |