Manticore-Platform / manticore-cliLinks
Manticore Adversary Emulation Cli
☆47Updated 5 years ago
Alternatives and similar repositories for manticore-cli
Users that are interested in manticore-cli are comparing it to the libraries listed below
Sorting:
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- C# User Simulation☆33Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- ☆14Updated 5 years ago
- ☆37Updated 5 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 5 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Fake SMB and SAMR data☆11Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 4 years ago
- Alphanumeric Encoder☆25Updated 7 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26Updated 3 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 6 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- ☆57Updated 5 years ago
- ☆33Updated 7 years ago