Telefonica / ATTPwnLinks
ATTPwn
☆216Updated last year
Alternatives and similar repositories for ATTPwn
Users that are interested in ATTPwn are comparing it to the libraries listed below
Sorting:
- Purple Teaming Attack & Hunt Lab - Terraform☆162Updated 4 years ago
- Active Directory Lab for Penetration Testing☆54Updated 6 months ago
- A PowerShell module to deploy active directory decoy objects.☆240Updated 6 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Updated 5 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆245Updated 5 years ago
- Disposable and resilient red team infrastructure with Terraform☆279Updated 7 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆344Updated 7 years ago
- Misc Threat Hunting Resources☆377Updated 3 years ago
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 5 years ago
- A modular OSINT honeypot for blue teamers☆340Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Updated last month
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- Atomic Purple Team Framework and Lifecycle☆301Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆402Updated last year
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- Picus Labs☆44Updated 4 years ago
- A Python script to collect campaign data from Gophish and generate a report☆199Updated 3 years ago
- ☆167Updated 5 years ago
- ☆69Updated 4 years ago
- A curated list of awesome BloodhoundAD resources☆238Updated 3 years ago
- Linux Incident Response☆90Updated 6 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆74Updated 2 weeks ago
- ☆399Updated last month
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago