☆65Jun 5, 2021Updated 4 years ago
Alternatives and similar repositories for Adversary-Emulation-Matrix
Users that are interested in Adversary-Emulation-Matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆14Jun 28, 2023Updated 2 years ago
- ☆18Jun 16, 2021Updated 4 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- ☆10May 30, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆111May 30, 2021Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆16Aug 16, 2022Updated 3 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Sep 2, 2021Updated 4 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- ☆211Mar 4, 2022Updated 4 years ago
- ☆28Aug 12, 2021Updated 4 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆21Jul 26, 2022Updated 3 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Jun 14, 2023Updated 2 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- ☆20May 18, 2022Updated 3 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 6 years ago
- ☆27Mar 25, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 7 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago