Our passion for cyber security

What it does

It automates the kill chain from surveillance to reconnaissance to exploitation and payload delivery while sustaining the integregrity and security of itself.

How I built it

We configured and Ubuntu image to run on a raspberry pi with suricata intrusion detection and prevention system set up to monitor and defend it's own hosted network. Meanwhile we made use of many different hacking tools in the kill chain and automated the use of these tools with python.

Challenges I ran into

Configuring the system to run correctly with an acceptable os and IDS/IPS has been the hardest issue.

What I learned

We learned a lot about managing and coordinating many tools to work together

Built With

Share this project: