This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
☆38Jun 12, 2024Updated last year
Alternatives and similar repositories for APT28-Adversary-Simulation
Users that are interested in APT28-Adversary-Simulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆44Jun 12, 2024Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆14Sep 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon☆13Jan 20, 2022Updated 4 years ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆12Jun 19, 2024Updated last year
- ☆20Apr 10, 2025Updated 11 months ago
- ☆31Aug 13, 2025Updated 7 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆43Oct 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- Using MCP is fun with Cyberbro!☆19Jan 27, 2026Updated 2 months ago
- Evtx Log (xml) Browser☆57Mar 12, 2023Updated 3 years ago
- Next-Gen Data Classification and Encryption☆15Jan 29, 2025Updated last year
- ☆12Updated this week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- Have you ever had a lot of internet and you don't know what to do with it? Reduce your internet volume with this source☆14Jul 17, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- General Purpose OpSec Server☆113Mar 13, 2026Updated 2 weeks ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- Metaverse gallery https://voxels.com/play?coords=NW@671W,8S @mrveryviral on insta☆18Mar 14, 2026Updated 2 weeks ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- A collection of tools, scripts and personal research☆157Feb 2, 2026Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆93Jan 14, 2026Updated 2 months ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Mar 12, 2026Updated 2 weeks ago
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Dump/disassemble python PYC files☆10Mar 16, 2015Updated 11 years ago
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆22Jun 17, 2025Updated 9 months ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- ☆86May 15, 2025Updated 10 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆93Apr 23, 2025Updated 11 months ago