A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
-
Updated
Jan 2, 2025 - Jinja
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Add a description, image, and links to the attack-range topic page so that developers can more easily learn about it.
To associate your repository with the attack-range topic, visit your repo's landing page and select "manage topics."