A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
-
Updated
Dec 27, 2024 - Jinja
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Open Breach and Attack Simulation Platform
GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
User Enumeration of Microsoft Teams users via API
A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.
A Splunk App for Attack Range Reporting. Provides dashboards for insights on your attack range simulations
Project to learn how to Protect Resources and Data in the Cloud
versatile red team simulation tool for testing browser-based attacks. It supports payloads like keylogging, screenshot capturing, webcam access, clipboard hijacking, geolocation tracking, and more
Pro Leak DDOS Mirai is a Python toolkit for simulating various DoS attacks, inspired by Mirai. It includes scripts for ACK Flood, SYN Flood, GRE IP Flood, and UDP Flood. This project
PurpleSharpEnhanced is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
An attack simulator designed to test SIEM/IDS/IPS detection/prevention capabilities on a given network.
A project that simulates common ToIP attacks (ARP spoofing, sniffing, port mirroring) to identify vulnerabilities and assess risks in ToIP systems.
An Ethereum attack reproducer for security study.
Add a description, image, and links to the attack-simulation topic page so that developers can more easily learn about it.
To associate your repository with the attack-simulation topic, visit your repo's landing page and select "manage topics."