Creates an ATT&CK Navigator map of an Adversary Emulation Plan
☆17Sep 4, 2021Updated 4 years ago
Alternatives and similar repositories for adversary-emulation-map
Users that are interested in adversary-emulation-map are comparing it to the libraries listed below
Sorting:
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- A tool to run and validate telemetry for Atomic Red Team tests☆16Mar 21, 2024Updated last year
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Checks our resources to monitor Identity Changes☆17Nov 29, 2025Updated 3 months ago
- Recon Hunt Queries☆79May 16, 2021Updated 4 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- A reverse socks5 proxy server and client☆18Oct 19, 2017Updated 8 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- ☆16May 15, 2021Updated 4 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- powershell script to simulate activity by a user☆22Jul 29, 2020Updated 5 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Oct 28, 2019Updated 6 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Serverless AWS application to upload and hash evidence files.☆23Oct 26, 2022Updated 3 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Feb 23, 2021Updated 5 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- A Django application to help red team operators manage a library of domain names☆167May 24, 2023Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago