0x4143 / adversaryemulation-gemsLinks
A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers
☆16Updated 3 years ago
Alternatives and similar repositories for adversaryemulation-gems
Users that are interested in adversaryemulation-gems are comparing it to the libraries listed below
Sorting:
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Repository for LNK stuff☆31Updated 3 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- ☆12Updated 3 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- ☆26Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated last month
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆31Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Kibana app for RedELK☆18Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 3 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- A user enumeration tool for Slack.☆34Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago