attack_range

Attack simulator

A tool to simulate attacks against virtual environments and collect data into Splunk for detection development

A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

GitHub

2k stars
78 watching
361 forks
Language: Jinja
last commit: 5 days ago
Linked from 1 awesome list

adversaryattack-rangeattack-simulationdetectionlabsimulationsimulations

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
splunk/attack_data A repository of curated datasets from various attacks 594
azure/simuland A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. 704
openbas-platform/openbas A comprehensive cyber adversary simulation platform for planning and conducting simulated attacks and exercises 765
nshalabi/attack-tools Utilities for simulating adversary behavior in the context of threat intelligence and security analysis 1,011
n0dec/malwless A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. 271
splunk/botsv2 A comprehensive security dataset and CTF platform for analysis and training of information security professionals. 358
elastic/swat A tool designed to simulate malicious behavior against Google Workspace environments for threat research and detection rule effectiveness testing 163
inodee/threathunting-spl Provides Splunk code and prototypes for building rules and queries to detect malicious activity 268
uber-common/metta An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. 1,103
splunk/security_content Delivers threat intelligence and detection capabilities to Splunk Enterprise Security 1,314
amv42/sshd-honeypot An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon 26
splunk/botsv1 A comprehensive security dataset and CTF platform designed to support information security professionals in analyzing and training on various attack scenarios 367
sea-erkin/log-snare A web application designed to simulate vulnerabilities and demonstrate the importance of proper validation and logging. 31
centerforaisafety/harmbench A standardized framework for evaluating and improving the robustness of large language models against adversarial attacks 366
mvelazc0/purplesharp An adversary simulation tool for Windows environments to generate attack telemetry and improve detection capabilities. 782