Threat Simulation Indexes
☆39Jan 9, 2026Updated last month
Alternatives and similar repositories for indexes
Users that are interested in indexes are comparing it to the libraries listed below
Sorting:
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 3 weeks ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 3 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- ☆20Mar 21, 2024Updated last year
- .Net Assembly loader for the GMSAPasswordReader☆17Feb 15, 2023Updated 3 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- Disabling PowerShell v2 with Group Policy☆15Mar 11, 2022Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- ☆89Jul 18, 2023Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- A CALDERA Plugin Template☆20Jan 7, 2026Updated 2 months ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆22Mar 5, 2018Updated 8 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- ☆22Jan 2, 2026Updated 2 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆20Aug 13, 2022Updated 3 years ago
- Swift 5 macOS agent☆113Jul 23, 2024Updated last year
- ☆21Dec 8, 2022Updated 3 years ago
- ☆24Jun 13, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago