A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers
☆16Jul 19, 2022Updated 3 years ago
Alternatives and similar repositories for adversaryemulation-gems
Users that are interested in adversaryemulation-gems are comparing it to the libraries listed below
Sorting:
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- SSRF 绕过 Payload☆15Nov 12, 2020Updated 5 years ago
- quotes i like.☆17Aug 1, 2019Updated 6 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Reverse Shell as a Service☆32Jul 6, 2020Updated 5 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆44Apr 5, 2017Updated 8 years ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- Simple HTTP async comms using standard GET/POST requests☆47Feb 5, 2026Updated last month
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 7 years ago
- ☆15Feb 2, 2025Updated last year
- Rapid Blockchain Prototypes for Rust☆15Feb 27, 2026Updated last week
- Documentation☆10Jan 29, 2026Updated last month
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- ☆15Feb 15, 2022Updated 4 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Dec 17, 2025Updated 2 months ago
- ☆10Sep 12, 2019Updated 6 years ago
- clonex space-pod decentralized frontend☆11Jul 16, 2022Updated 3 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- ☆15Dec 15, 2022Updated 3 years ago
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- Non-Recursive Inverting of Binary Tree in Rust☆20Oct 7, 2021Updated 4 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- ☆11Aug 7, 2021Updated 4 years ago