SpecterOps / Nemesis
An offensive data enrichment pipeline
☆668Updated last month
Alternatives and similar repositories for Nemesis:
Users that are interested in Nemesis are comparing it to the libraries listed below
- An open-source self-hosted purple team management web application.☆260Updated this week
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆721Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆785Updated 3 weeks ago
- a tool to help operate in EDRs' blind spots☆721Updated 3 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,204Updated 3 weeks ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆573Updated 3 weeks ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆372Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,615Updated 4 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆528Updated 3 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆568Updated 8 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆486Updated 2 years ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆446Updated 11 months ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,023Updated 4 months ago
- Compiled tools for internal assessments☆272Updated this week
- Useful C2 techniques and cheatsheets learned from engagements☆467Updated 4 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆351Updated 11 months ago
- HookChain: A new perspective for Bypassing EDR Solutions☆500Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆401Updated this week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆620Updated 9 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,068Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆257Updated this week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆707Updated last year
- A RedTeam Toolkit☆394Updated 4 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆573Updated last week
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆991Updated 4 months ago
- An ADCS honeypot to catch attackers in your internal network.☆283Updated 8 months ago
- Ransomware simulator written in Golang☆426Updated 2 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆324Updated last week
- Dump NTDS with golden certificates and UnPAC the hash☆633Updated 11 months ago
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆462Updated this week