S3N4T0R-0X0 / APT-Attack-SimulationLinks
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
☆658Updated last month
Alternatives and similar repositories for APT-Attack-Simulation
Users that are interested in APT-Attack-Simulation are comparing it to the libraries listed below
Sorting:
- ☆477Updated 3 weeks ago
- Certified Red Team Operator☆415Updated 3 years ago
- A RedTeam Toolkit☆398Updated 2 months ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆377Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆421Updated 2 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆889Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated last year
- This is for Ethical Use only.☆389Updated last week
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆210Updated this week
- Lab used for workshop and CTF☆239Updated last week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆753Updated 2 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆652Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆389Updated 8 months ago
- AV/EDR Lab environment setup references to help in Malware development☆385Updated 3 months ago
- PEN-300 collection to help you on your exam.☆607Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆212Updated 3 months ago
- Everything from my OSEP study.☆124Updated 4 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆378Updated 2 weeks ago
- ☆457Updated this week
- Red team Interview Questions☆654Updated last month
- Active Directory Auditing and Enumeration☆453Updated 3 weeks ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆664Updated last week
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆497Updated 5 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆239Updated 3 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆171Updated 7 months ago
- Active Directory pentesting mind map☆421Updated 2 years ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆298Updated 2 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆675Updated this week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆357Updated 9 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆568Updated 7 months ago