S3N4T0R-0X0 / APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
☆496Updated last month
Alternatives and similar repositories for APT-Attack-Simulation:
Users that are interested in APT-Attack-Simulation are comparing it to the libraries listed below
- ☆426Updated last week
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆372Updated last month
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆200Updated 4 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆573Updated 3 weeks ago
- A RedTeam Toolkit☆394Updated 4 months ago
- Certified Red Team Operator☆384Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆401Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆620Updated 9 months ago
- AV/EDR Lab environment setup references to help in Malware development☆367Updated 3 weeks ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆216Updated 2 years ago
- Active Directory pentesting mind map☆390Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆687Updated 10 months ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆332Updated last year
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆573Updated last week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆562Updated 8 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆552Updated 4 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆234Updated 5 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆213Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆286Updated this week
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆270Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆651Updated last year
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆284Updated last month
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆143Updated 4 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆593Updated 2 weeks ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆501Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆340Updated 5 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆147Updated 2 years ago
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆485Updated 2 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆328Updated 3 months ago