This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and other malicious artifacts that mirror those used in real world attacks .
☆1,075Apr 27, 2026Updated last week
Alternatives and similar repositories for APTs-Adversary-Simulation
Users that are interested in APTs-Adversary-Simulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆519Aug 14, 2025Updated 8 months ago
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,412Updated this week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆444May 22, 2025Updated 11 months ago
- Abusing Azure services over C2☆370Jan 20, 2026Updated 3 months ago
- C2 infrastructure over Microsoft Teams.☆749Jan 15, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A resource containing all the tools each ransomware gangs uses☆1,356Apr 1, 2026Updated last month
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆326Oct 12, 2025Updated 6 months ago
- ☆700May 2, 2026Updated last week
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- Reaping treasures from strings in remote processes memory☆287Feb 8, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- Lab used for workshop and CTF☆515Feb 3, 2026Updated 3 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,482Updated this week
- AV/EDR Lab environment setup references to help in Malware development☆464Feb 19, 2025Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆794Jan 26, 2026Updated 3 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆575May 22, 2025Updated 11 months ago
- A PoC for Early Cascade process injection technique.☆216Jan 30, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆552May 9, 2025Updated 11 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆166Oct 5, 2024Updated last year
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Windows rootkit designed to work with BYOVD exploits☆219Jan 18, 2025Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆937Updated this week
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆513Mar 7, 2026Updated 2 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆441Jul 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- EDR Lab for Experimentation Purposes☆1,447Mar 1, 2026Updated 2 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,446Apr 9, 2026Updated last month
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆236Aug 20, 2025Updated 8 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,066Mar 22, 2026Updated last month
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆721May 7, 2025Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆480Oct 29, 2025Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆210Dec 25, 2024Updated last year