0x4143 / adversaryemulation-gemsLinks
A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers
☆15Updated 2 years ago
Alternatives and similar repositories for adversaryemulation-gems
Users that are interested in adversaryemulation-gems are comparing it to the libraries listed below
Sorting:
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- ☆12Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- A simple to use single-include Windows API resolver☆21Updated 11 months ago
- ☆28Updated last year
- WMI SA stuffs☆30Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- ☆18Updated last year
- ☆12Updated 4 years ago
- ☆15Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- ☆14Updated last year
- ☆17Updated 5 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆31Updated 2 weeks ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year