S3N4T0R-0X0 / APT-Attack-SimulationLinks
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
☆672Updated 2 months ago
Alternatives and similar repositories for APT-Attack-Simulation
Users that are interested in APT-Attack-Simulation are comparing it to the libraries listed below
Sorting:
- A RedTeam Toolkit☆400Updated 2 months ago
- ☆495Updated last week
- Certified Red Team Operator☆416Updated 3 years ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆212Updated 3 weeks ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆387Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆951Updated 3 weeks ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆397Updated last week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆785Updated 2 months ago
- PEN-300 collection to help you on your exam.☆619Updated this week
- This is for Ethical Use only.☆401Updated last month
- Lab used for workshop and CTF☆250Updated last month
- AV/EDR Lab environment setup references to help in Malware development☆388Updated 4 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆666Updated last month
- EDR & Antivirus Bypass to Gain Shell Access