A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers
☆16Jul 19, 2022Updated 3 years ago
Alternatives and similar repositories for adversaryemulation-gems
Users that are interested in adversaryemulation-gems are comparing it to the libraries listed below
Sorting:
- Make your swine run like it's Divine☆10Mar 14, 2025Updated 11 months ago
- SSRF 绕过 Payload☆15Nov 12, 2020Updated 5 years ago
- quotes i like.☆17Aug 1, 2019Updated 6 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆44Apr 5, 2017Updated 8 years ago
- Reverse Shell as a Service☆32Jul 6, 2020Updated 5 years ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 7 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Simple HTTP async comms using standard GET/POST requests☆47Feb 5, 2026Updated last month
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 7 years ago
- Documentation☆10Jan 29, 2026Updated last month
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Linux integrity monitoring for CentOS/RHEL☆12May 13, 2020Updated 5 years ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- Rapid Blockchain Prototypes for Rust☆15Feb 27, 2026Updated last week
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- ☆15Feb 2, 2025Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 7 months ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆15Feb 15, 2022Updated 4 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Dec 17, 2025Updated 2 months ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- A Custom Transport strategy of the NestJS microservices pattern for Cloud Pub/Sub☆11Mar 17, 2025Updated 11 months ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- ☆19Jan 8, 2026Updated 2 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- RTL-SDR 433MHz signal recovery with MATLAB☆12Feb 13, 2015Updated 11 years ago