☆19Jun 16, 2021Updated 4 years ago
Alternatives and similar repositories for Mitre-Attack-Matrix
Users that are interested in Mitre-Attack-Matrix are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- New Framework Red Team Operations☆21Jun 7, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Aug 16, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- ☆28Mar 25, 2021Updated 5 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- ☆20May 18, 2022Updated 3 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- ☆212Mar 4, 2022Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Oct 1, 2021Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Nov 26, 2025Updated 4 months ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- T-Guard Repository☆18May 2, 2024Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Nov 23, 2021Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 7 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Nov 26, 2025Updated 4 months ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- ☆158Sep 20, 2021Updated 4 years ago