CyberSecurityUP / GCP-Adversary-Emulator
Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.
☆14Updated 3 months ago
Related projects: ⓘ
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- Challenge Python☆18Updated last year
- ☆14Updated last year
- ☆77Updated 5 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆106Updated 7 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- ☆31Updated 5 months ago
- A network logging tool that logs per process activities☆32Updated last year
- A collection of tools that I use in CTF's or for assessments☆50Updated 3 weeks ago
- Powershell tools used for Red Team / Pentesting.☆73Updated 8 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- This is an AD pentest tools collection☆52Updated 2 months ago
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- Automated Active Directory lab running on Proxmox☆64Updated last month
- ☆34Updated 5 months ago
- ☆31Updated 2 weeks ago
- Modules for my C2 course students to use for their own projects.☆73Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 9 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆45Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- ☆48Updated 2 weeks ago
- ☆25Updated last week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆83Updated 5 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆99Updated 4 months ago
- ☆35Updated 9 months ago