S3N4T0R-0X0 / APT-Attack-SimulationLinks
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
☆685Updated last week
Alternatives and similar repositories for APT-Attack-Simulation
Users that are interested in APT-Attack-Simulation are comparing it to the libraries listed below
Sorting:
- A RedTeam Toolkit☆402Updated 3 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆969Updated last month
- ☆508Updated 2 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆790Updated 3 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆217Updated last month
- This is for Ethical Use only.☆412Updated last month
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆639Updated last year
- Certified Red Team Operator☆417Updated 3 years ago
- C2 infrastructure over Microsoft Teams.☆690Updated 6 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆673Updated 4 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆395Updated 2 years ago
- Red team Interview Questions☆662Updated 3 months ago
- Lab used for workshop and CTF☆254Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆390Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆406Updated last month
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆572Updated 9 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆368Updated this week
- AV/EDR Lab environment setup references to help in Malware development☆391Updated 4 months ago
- ☆512Updated last month
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆269Updated last month
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆702Updated 2 weeks ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆674Updated last month
- Simulate the behavior of AV/EDR for malware development training.☆530Updated last year
- Active Directory Auditing and Enumeration☆464Updated last week
- EDR & Antivirus Bypass to Gain Shell Access☆245Updated 9 months ago
- An offensive data enrichment pipeline☆770Updated this week
- Active Directory pentesting mind map☆429Updated 2 years ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆498Updated 6 months ago
- EDR Lab for Experimentation Purposes☆1,289Updated last week