seed-labs
AdversaryEmulation
seed-labs | AdversaryEmulation | |
---|---|---|
9 | 1 | |
694 | 99 | |
2.4% | - | |
9.2 | 0.0 | |
30 days ago | about 1 year ago | |
Python | Python | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
seed-labs
-
Cybersecurity Course Suggestion
I would recommend the labs and content at https://seedsecuritylabs.org
- Cybersecurity courses at UB
-
Where to run commands for Docker
My professor has a lab for us and wants us to do THIS lab and I'm only getting. I need to set up multiple networks from the folder he gave us a ton of different files which I'm unsure what each one of them does. Where do I run commands for docker? is it in command line?
-
Spectre Attack Lab
SEEDS Main Page
-
MSCS Course Suggestions?
I'm not sure if computer security is the same as internet security. Professor Du taught it when I was there. It was really hard, but I learned a lot. I believe he has an open source version of the labs. open source website
- SEED Project
-
Ideas for labs for students (suggestions or help/advice)
I used these in college, not the most advanced but pretty simple to set up https://seedsecuritylabs.org/
-
What Do Virus Scripts/Files look like?
One of my courses borrowed from here, there's a lot of different ways to start an attack and it was fun to actually use some of them and gain access (the flaws have since been patched, but real exploits were found for a variety of systems).
-
Man in the Middle in C with netcat TCP packets
I'm implementing an ARP spoofing and man in the middle attack tool in C. For that I took the docker container config from Seed Labs. Here three containers are present: Host A (ip: 10.9.0.5, mac: 02:42:0a:09:00:05), Host B (ip: 10.9.0.6, mac: 02:42:0a:09:00:06), and Host M (ip: 10.9.0.105, mac: 02:42:0a:09:00:69). Host M is to be the attacker.
AdversaryEmulation
What are some alternatives?
arp_poisoning - Arp Poisoning tool in C using raw sockets
hackthebox - Notes Taken for HTB Machines & InfoSec Community.
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
caldera - Automated Adversary Emulation Platform
PythonProblems - The graded lab problems for the author's course CCPS 109 Computer Science I.
caldera_pathfinder - Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
SecGen - Create randomly insecure VMs
ScrapMechanicSeedTool - A tool that allows you to modify the seed of scrap mechanic save files.
netlab - Making virtual networking labs suck less