S3N4T0R-0X0 / APTs-Adversary-SimulationLinks
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
☆751Updated this week
Alternatives and similar repositories for APTs-Adversary-Simulation
Users that are interested in APTs-Adversary-Simulation are comparing it to the libraries listed below
Sorting:
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,186Updated last month
- A RedTeam Toolkit☆407Updated 2 months ago
- ☆604Updated 2 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆805Updated 6 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆807Updated 7 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆431Updated 3 weeks ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆475Updated 2 years ago
- Certified Red Team Operator☆430Updated 3 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆668Updated last year
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆221Updated 2 months ago
- This is for Ethical Use only.☆437Updated 5 months ago
- C2 infrastructure over Microsoft Teams.☆725Updated 9 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆714Updated 2 months ago
- Red team Interview Questions☆693Updated 6 months ago
- A resource containing all the tools each ransomware gangs uses☆1,246Updated last week
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆367Updated 2 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆383Updated last week
- Windows Local Privilege Escalation Cookbook☆1,198Updated 9 months ago
- EDR Lab for Experimentation Purposes☆1,367Updated this week
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆503Updated 9 months ago
- PEN-300 collection to help you on your exam.☆668Updated 2 months ago
- A centralized and enhanced memory analysis platform☆504Updated 3 months ago
- Simulate the behavior of AV/EDR for malware development training.☆545Updated last year
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆346Updated 4 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆428Updated 2 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆712Updated 5 months ago
- Active Directory pentesting mind map☆482Updated 2 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆410Updated 5 months ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆285Updated 2 months ago
- An offensive data enrichment pipeline☆859Updated this week