☆65Jun 5, 2021Updated 4 years ago
Alternatives and similar repositories for Adversary-Emulation-Matrix
Users that are interested in Adversary-Emulation-Matrix are comparing it to the libraries listed below
Sorting:
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- ☆16Jul 19, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆111May 30, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆210Mar 4, 2022Updated 3 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆18Sep 2, 2021Updated 4 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- ☆21Jul 26, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- ☆20Sep 2, 2021Updated 4 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Mar 31, 2019Updated 6 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆667Jun 14, 2023Updated 2 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Repository resource for threat hunter☆158Sep 14, 2018Updated 7 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- ☆27Mar 25, 2021Updated 4 years ago
- ☆103Aug 31, 2021Updated 4 years ago