Threat Simulation Indexes
☆39Jan 9, 2026Updated 3 months ago
Alternatives and similar repositories for indexes
Users that are interested in indexes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,561Apr 3, 2026Updated 2 weeks ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Sep 15, 2023Updated 2 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 4 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆123Mar 18, 2026Updated 3 weeks ago
- ☆20Mar 21, 2024Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆727Nov 14, 2025Updated 5 months ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ransomware Simulator for testing Blue Team Detections☆36Jun 5, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- ☆13Feb 6, 2018Updated 8 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆287Mar 20, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated 2 months ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Windows Event Log Knowledge Base☆33Updated this week
- NTLM HTTP relay tool with SOCKS proxy for browser session hijacking☆132Apr 6, 2026Updated last week
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆417Updated this week
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago