attack_range
awesome-emulators-simulators
attack_range | awesome-emulators-simulators | |
---|---|---|
12 | 1 | |
1,965 | 177 | |
2.3% | - | |
7.7 | 5.1 | |
14 days ago | 5 months ago | |
Jinja | ||
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
attack_range
-
Splunk core certification
My advice… Don’t rush. Study the material and get a good understanding of the fundamentals. Each certification builds on the previous ones. If Splunk is a path you want to pursue, build those fundamentals. Put in the reps in a lab. Download BOTS, attack range data sets. Take a look at Splunk & Machine Learning YouTube channel. His videos are fantastic and he maintains a GitHub repo so you can use the datasets to practice what you learned on the video.
- Is there any repository for sample raw audit logs for various software platforms?
- Need to setup AD lab for praticing..
-
Dataset I can test IDS/IPS tools against?
Somewhat related, but if you’re using splunk, you could use Splunk Attack Range which simulates attacks.
- learning splunk. is there a way to "play" with it?
-
Introducing Splunk Attack Range v2.0
hey I think you are looking at a older repo for the local attack_range, we have not maintained this .. the current Splunk Attack Range lives here: https://github.com/splunk/attack_range/
-
Anyone have experience building a Windows AD lab environment in Docker?
Since you mention your in-depth ELK workflow, have you tried DetectionLab or Splunk's Attack Range? If you just want a fully working AD domain set up with various hosts, you can spin up the Red Team Attack Lab and then hook in your own logging stuff after it's built.
-
Terraform and Ansible
This is a project I've contributed to at work. It's designed to launch & configure a lab environment for security researchers, but that's not too important. It has a python CLI that takes a configuration file. That config file determines what bits of Terraform and ansible are executed. The Terraform builds instances in AWS (or Azure) and all the associated bits, and then calls the ansible playbook to provision that type of host.
-
Cool security project using Splunk?
Attack range: https://github.com/splunk/attack_range
-
How-to build detection scenarios properly?
have a look at Splunk's Attack Range project, which automates Caldera and Atomic Red Team for these kinds of purposes. i think this might help you as you gauge visibility, rulesets, etc ... https://github.com/splunk/attack_range
awesome-emulators-simulators
-
A minimal and beginner friendly 6502 Emulator written in plain C using ncurses for graphics.
I do recall doing a search for an 8051 cpu emulator a while back. I did encounter pages like this and this. The latter mostly deals with JavaScript (which is less useful in my opinion) but this project could be a very good addition to these kinds of collections. Both lists seem to be quite well maintained.
What are some alternatives?
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
jsemu - A list of emulators written in the JavaScript programming language
red_team_attack_lab - Red Team Attack Lab for TTP testing & research
neofetch.d64 - neofetch spoof for c64
BlueTeam.Lab - Blue Team detection lab created with Terraform and Ansible in Azure.
Amiga_Sources - A compiled list of sources and hardware related to classic Commodore Amiga computers.
attack_range_local - Build a attack range in your local machine
FG-1000 - FG-1000 is a 5+ Gen Stealth Supersonic Air Superiority Fighter for FlightGear Flight Simulator.
fakernet - A framework for quickly creating internet-like services for labs, exercises, and research.
C64-A-V-Adaptor - An A/V-adaptor board for the C64
Awesome-Cybersecurity-Datasets - A curated list of amazingly awesome Cybersecurity datasets
vicii-kawari - Commodore 64 VIC-II 6567/6569 Replacement Project