mirror of
https://github.com/fabacab/awesome-cybersecurity-blueteam.git
synced 2024-10-01 01:15:39 -04:00
Add Stratus Red Team.
This commit is contained in:
parent
52614c3dc1
commit
f8ee8314b7
@ -319,6 +319,7 @@ See also [awesome-pentest § Social Engineering Tools](https://github.com/fabaca
|
|||||||
- [Metta](https://github.com/uber-common/metta) - Automated information security preparedness tool to do adversarial simulation.
|
- [Metta](https://github.com/uber-common/metta) - Automated information security preparedness tool to do adversarial simulation.
|
||||||
- [Network Flight Simulator (`flightsim`)](https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network visibility.
|
- [Network Flight Simulator (`flightsim`)](https://github.com/alphasoc/flightsim) - Utility to generate malicious network traffic and help security teams evaluate security controls and audit their network visibility.
|
||||||
- [RedHunt OS](https://github.com/redhuntlabs/RedHunt-OS) - Ubuntu-based Open Virtual Appliance (`.ova`) preconfigured with several threat emulation tools as well as a defender's toolkit.
|
- [RedHunt OS](https://github.com/redhuntlabs/RedHunt-OS) - Ubuntu-based Open Virtual Appliance (`.ova`) preconfigured with several threat emulation tools as well as a defender's toolkit.
|
||||||
|
- [Stratus Red Team](https://stratus-red-team.cloud/) - Emulate offensive attack techniques in a granular and self-contained manner against a cloud environment; think "Atomic Red Team™ for the cloud."
|
||||||
- [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems.
|
- [tcpreplay](https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic originally designed to replay malicious traffic patterns to Intrusion Detection/Prevention Systems.
|
||||||
|
|
||||||
### Post-engagement analysis and reporting
|
### Post-engagement analysis and reporting
|
||||||
|
Loading…
Reference in New Issue
Block a user