MSAdministrator / goattckLinks
A Golang CLI for the MITRE ATT&CK Framework
☆12Updated last month
Alternatives and similar repositories for goattck
Users that are interested in goattck are comparing it to the libraries listed below
Sorting:
- ☆45Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Living off the False Positive!☆37Updated 4 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- ☆41Updated 10 months ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆28Updated 10 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- a tiny program to consume from ETW providers for research☆48Updated 5 months ago
- ☆14Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 11 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- create a "simulated internet" cyber range environment☆16Updated last week
- Bloodhound agent for Mythic☆19Updated last month
- Entra ID Password Protection Banned Password Lists☆16Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆23Updated 3 weeks ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Continuous kerberoast monitor☆45Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated 2 months ago
- ☆54Updated 5 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆48Updated last year
- Tool to perform lateral movement between AAD joined devices☆61Updated 2 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆22Updated 4 months ago