attack_range
Attack simulator
A tool to simulate attacks against virtual environments and collect data into Splunk for detection development
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
2k stars
78 watching
361 forks
Language: Jinja
last commit: 4 months ago
Linked from 1 awesome list
adversaryattack-rangeattack-simulationdetectionlabsimulationsimulations
Related projects:
Repository | Description | Stars |
---|---|---|
| A repository of curated datasets from various attacks | 594 |
| A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| A comprehensive cyber adversary simulation platform for planning and conducting simulated attacks and exercises | 765 |
| Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
| A comprehensive security dataset and CTF platform for analysis and training of information security professionals. | 358 |
| A tool designed to simulate malicious behavior against Google Workspace environments for threat research and detection rule effectiveness testing | 163 |
| Provides Splunk code and prototypes for building rules and queries to detect malicious activity | 268 |
| An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |
| Delivers threat intelligence and detection capabilities to Splunk Enterprise Security | 1,319 |
| An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| A comprehensive security dataset and CTF platform designed to support information security professionals in analyzing and training on various attack scenarios | 367 |
| A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
| A standardized framework for evaluating and improving the robustness of large language models against adversarial attacks | 366 |
| An adversary simulation tool for Windows environments to generate attack telemetry and improve detection capabilities. | 782 |