SecurityRiskAdvisors / indexesView external linksLinks
Threat Simulation Indexes
☆39Jan 9, 2026Updated last month
Alternatives and similar repositories for indexes
Users that are interested in indexes are comparing it to the libraries listed below
Sorting:
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,548Nov 24, 2025Updated 2 months ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Command line $MFT record decoder☆12May 20, 2017Updated 8 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- ☆20Mar 21, 2024Updated last year
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- Simple Neo4j PowerShell Wrapper☆30Oct 24, 2019Updated 6 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆120Jul 23, 2023Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Disabling PowerShell v2 with Group Policy☆15Mar 11, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 2 months ago
- C# DCOM Execution☆18Aug 4, 2019Updated 6 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Oct 29, 2024Updated last year
- ☆89Jul 18, 2023Updated 2 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 2 years ago
- A CALDERA Plugin Template☆20Jan 7, 2026Updated last month
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- ☆22Mar 5, 2018Updated 7 years ago
- ☆22Jan 2, 2026Updated last month
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago
- Swift 5 macOS agent☆113Jul 23, 2024Updated last year
- ☆24Jun 13, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Windows Event Log Knowledge Base☆29Dec 23, 2025Updated last month
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- ☆56Dec 13, 2024Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago