S3N4T0R-0X0 / APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
☆640Updated last month
Alternatives and similar repositories for APT-Attack-Simulation:
Users that are interested in APT-Attack-Simulation are comparing it to the libraries listed below
- ☆454Updated last week
- Certified Red Team Operator☆411Updated 3 years ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆709Updated last month
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆206Updated 5 months ago
- A RedTeam Toolkit☆395Updated 3 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆736Updated 3 weeks ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆304Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆622Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆375Updated 6 months ago
- AV/EDR Lab environment setup references to help in Malware development☆374Updated 2 months ago
- This is for Ethical Use only.☆327Updated 3 weeks ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆630Updated 10 months ago
- PEN-300 collection to help you on your exam.☆538Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆561Updated 6 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,237Updated this week
- A resource containing all the tools each ransomware gangs uses☆1,008Updated this week
- ☆266Updated this week
- a tool to help operate in EDRs' blind spots☆728Updated 4 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆373Updated 4 months ago
- Red team Interview Questions☆641Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆658Updated last week
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆656Updated last year
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆343Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆236Updated 6 months ago
- Live Feed of C2 servers, tools, and botnets☆621Updated this week
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆489Updated 3 months ago
- Simulate the behavior of AV/EDR for malware development training.☆519Updated last year
- Windows Local Privilege Escalation Cookbook☆1,096Updated 3 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,644Updated 5 months ago