This project contains a set of Terraform and Ansible scripts to create an orchestrated BlueTeam Lab. The goal is to provide red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data. NOTE: This lab is deliberately designed to be insecure. Please do not connect this system to any network you care about. Lab Layout Prerequisites: A number of features need to be installed on your system in order to use this setup. Step 1 - Install Azure CLI. More details on https://docs.microsoft.com/en-us/cli/azure/install-azure-cli-linux?pivots=apt curl -sL https://aka.ms/InstallAzureCLIDeb | sudo bash. Step 2 - Install Terraform. More details on https://learn.hashicorp.com/tutorials/terraform/install-cli sudo apt-get update && sudo apt-get install -y gnupg software-properties-common curl curl -fsSL https://apt.releases.hashicorp.com/gpg | sudo apt-key add - sudo apt-add-repository 'deb [arch=amd64] https://apt.releases.hashicorp.com $(lsb_release -cs) main' sudo apt-get update && sudo apt-get install terraform
FEATURES
SIMILAR TOOLS
This tutorial describes how to set up two-factor authentication for an SSH server by integrating Google Authenticator with OpenSSH.
Interactive computational environment for code execution, text, and media combination.
A tool to verify the integrity of PNG, JNG, and MNG files and extract detailed information about the image.
A Node.js Ebook by GENTILHOMME Thomas, covering Node.js development and resources
Personal website of Collin R. Mulliner with a focus on security research and mobile platforms.
A guide to secure Ruby development, providing guidelines and recommendations for secure coding practices.
Free multi-platform database tool with support for various databases and rich features.
A comprehensive guide for implementing best practices in cybersecurity across various systems.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.