This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
☆38Jun 12, 2024Updated last year
Alternatives and similar repositories for APT28-Adversary-Simulation
Users that are interested in APT28-Adversary-Simulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a simulation of attack by the Cozy Bear group (APT-29) targeting diplomatic missions☆45Jun 12, 2024Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 9 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Sep 26, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Creating a Bind Shell in C☆20Aug 21, 2023Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- A curated list of blogs, videos, tutorials, code, tools, scripts, and anything useful to help you learn Azure Policy - by @JesseLoudon☆13Jan 20, 2022Updated 4 years ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- Execute shellcode via ASPNET compiler☆60Oct 2, 2025Updated 6 months ago
- ☆31Aug 13, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆44Oct 11, 2023Updated 2 years ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- Using MCP is fun with Cyberbro!☆18Apr 8, 2026Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆512Aug 14, 2025Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- Metaverse gallery https://voxels.com/play?coords=NW@671W,8S @mrveryviral on insta☆18Mar 14, 2026Updated last month
- Silo Contracts V2 is a collection of modular Solidity smart contracts designed to streamline decentralized finance applications on Ethere…☆25Oct 29, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- General Purpose OpSec Server☆113Mar 13, 2026Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 3 months ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Apr 9, 2026Updated last week
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Live ETW-TI event viewer for Windows kernel threat-intelligence telemetry. Research tool for exploring the same signals commercial EDRs r…☆90Apr 12, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dump/disassemble python PYC files☆10Mar 16, 2015Updated 11 years ago
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆22Jun 17, 2025Updated 10 months ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- ☆86May 15, 2025Updated 11 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆99Jan 10, 2026Updated 3 months ago