Docker Container to deploy Mitre Caldera Automated Adversary Emulation System
☆26Sep 26, 2020Updated 5 years ago
Alternatives and similar repositories for docker-caldera
Users that are interested in docker-caldera are comparing it to the libraries listed below
Sorting:
- A list of Mitre Caldera compatible emulation-plans☆14Feb 1, 2021Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- LNK to JSON☆14Mar 7, 2019Updated 6 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 7 years ago
- A simulated WiFi capture the flag setup☆18Nov 1, 2022Updated 3 years ago
- Run Splunk heavy forwarders in Docker Swarm for high availability, security, and reduced cost!☆14Aug 19, 2025Updated 6 months ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- vTunnel is a tool that proxies IP traffic between guest and host networks by using the VSOCK protocol.☆29Mar 19, 2024Updated last year
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- A few scripts I put together to send and receive data from an Azure Log Analytics workspace leveraging the Azure Monitor HTTP Data Collec…☆22May 22, 2023Updated 2 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 3 years ago
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆22Jun 3, 2019Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Mar 30, 2019Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- ☆54May 14, 2024Updated last year
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- ☆25Sep 17, 2023Updated 2 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago