leonidas
Attack simulator
Automated attack simulation framework for cloud environments
Automated Attack Simulation in the Cloud, complete with detection use cases.
535 stars
26 watching
63 forks
Language: Python
last commit: 3 months ago
Linked from 3 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
| A vulnerable Azure infrastructure simulator used to demonstrate and practice cloud security vulnerabilities | 801 |
| A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| A tool for generating intentionally insecure cloud infrastructure for testing and auditing purposes | 666 |
| A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. | 31 |
| An AWS deployment tool designed to provide intentionally vulnerable cloud infrastructure for hands-on learning and penetration testing. | 2,991 |
| An experimentation platform to investigate the interaction of automated agents in abstract simulated network environments. | 1,670 |
| An operating system designed to simulate cloud environments for security testing and assessment. | 590 |
| A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
| An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| A tool for stress testing distributed systems by simulating client load. | 13 |
| This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 284 |
| A tool for simulating stateful Ethereum smart contracts in a sandbox environment | 685 |
| A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. | 458 |
| A front-end web application designed to test and analyze network connections, simulating a honeypot for low-interaction attacks. | 66 |