attack_range
Attack simulator
A tool to simulate attacks against virtual environments and collect data into Splunk for detection development
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
2k stars
78 watching
361 forks
Language: Jinja
last commit: 11 months ago
Linked from 1 awesome list
adversaryattack-rangeattack-simulationdetectionlabsimulationsimulations
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A repository of curated datasets from various attacks | 594 |
| | A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| | A comprehensive cyber adversary simulation platform for planning and conducting simulated attacks and exercises | 765 |
| | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| | A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
| | A comprehensive security dataset and CTF platform for analysis and training of information security professionals. | 358 |
| | A tool designed to simulate malicious behavior against Google Workspace environments for threat research and detection rule effectiveness testing | 163 |
| | Provides Splunk code and prototypes for building rules and queries to detect malicious activity | 268 |
| | An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |
| | Delivers threat intelligence and detection capabilities to Splunk Enterprise Security | 1,319 |
| | An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| | A comprehensive security dataset and CTF platform designed to support information security professionals in analyzing and training on various attack scenarios | 367 |
| | A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. | 31 |
| | A standardized framework for evaluating and improving the robustness of large language models against adversarial attacks | 366 |
| | An adversary simulation tool for Windows environments to generate attack telemetry and improve detection capabilities. | 782 |