CyberSecurityUP / Adversary-Emulation-Guide
☆17Updated last year
Alternatives and similar repositories for Adversary-Emulation-Guide:
Users that are interested in Adversary-Emulation-Guide are comparing it to the libraries listed below
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- ☆29Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆21Updated last week
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 7 months ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 5 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- ☆12Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆39Updated 2 years ago
- This repository provides a comprehensive collection of detection rules and threat intelligence focused on malicious Chrome extensions sup…☆8Updated 2 weeks ago
- Tools used for Pentesting☆22Updated last year
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated last year
- SOAPI - The OpenAPI Documentation Scanner☆24Updated this week
- ☆34Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆26Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆19Updated last year
- ☆11Updated 5 months ago
- ☆23Updated 5 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 7 months ago
- Manage attack surface data on Elasticsearch☆21Updated last year