A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
-
Updated
Nov 6, 2024 - Jinja
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Add a description, image, and links to the attack-range topic page so that developers can more easily learn about it.
To associate your repository with the attack-range topic, visit your repo's landing page and select "manage topics."