This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and other malicious artifacts that mirror those used in real world attacks .
☆1,051Mar 8, 2026Updated this week
Alternatives and similar repositories for APTs-Adversary-Simulation
Users that are interested in APTs-Adversary-Simulation are comparing it to the libraries listed below
Sorting:
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Aug 14, 2025Updated 6 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,317Nov 12, 2025Updated 3 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆436May 22, 2025Updated 9 months ago
- C2 infrastructure over Microsoft Teams.☆739Jan 15, 2025Updated last year
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆323Oct 12, 2025Updated 4 months ago
- A resource containing all the tools each ransomware gangs uses☆1,332Dec 24, 2025Updated 2 months ago
- ☆682Feb 28, 2026Updated last week
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆564Feb 15, 2024Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆779Jan 26, 2026Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆813Mar 28, 2025Updated 11 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,823Nov 3, 2024Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆425Feb 19, 2025Updated last year
- Mapping of open-source detection rules and atomic tests.☆202Feb 16, 2026Updated 3 weeks ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- Reaping treasures from strings in remote processes memory☆284Feb 8, 2025Updated last year
- A PoC for Early Cascade process injection technique.☆211Jan 30, 2025Updated last year
- Lab used for workshop and CTF☆500Feb 3, 2026Updated last month
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆539May 9, 2025Updated 10 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆204Mar 6, 2025Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,319Updated this week
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆570May 22, 2025Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,166Mar 28, 2025Updated 11 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆911Feb 20, 2026Updated 2 weeks ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆502Jan 23, 2026Updated last month
- Open Source C&C Specification☆277Feb 28, 2025Updated last year
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Jul 8, 2024Updated last year
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- EDR Lab for Experimentation Purposes☆1,415Mar 1, 2026Updated last week
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,775Updated this week
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,410Jan 19, 2026Updated last month
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- HookChain: A new perspective for Bypassing EDR Solutions☆592Jan 5, 2025Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 10 months ago