ATTPwn
☆219Mar 9, 2024Updated 2 years ago
Alternatives and similar repositories for ATTPwn
Users that are interested in ATTPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Nov 25, 2020Updated 5 years ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆633May 28, 2024Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Nov 26, 2020Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A modular OSINT honeypot for blue teamers☆347May 2, 2023Updated 3 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆845Feb 23, 2026Updated 2 months ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆246Dec 10, 2020Updated 5 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,570Apr 24, 2026Updated 3 weeks ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆109Feb 12, 2023Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆177Feb 14, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Audit Windows Security with best Practice☆190Sep 25, 2024Updated last year
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆37May 20, 2020Updated 6 years ago
- Atomic Purple Team Framework and Lifecycle☆301Feb 11, 2021Updated 5 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆732Jan 21, 2020Updated 6 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Cloud Templates and scripts to deploy mordor environments☆130Mar 3, 2021Updated 5 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆612Nov 28, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆40Jul 29, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DeepSea Phishing Gear☆123Jul 20, 2020Updated 5 years ago
- easy-to-use payload hosting☆275Apr 22, 2022Updated 4 years ago
- Password Spraying Framework☆64Jun 9, 2022Updated 3 years ago
- ☆106May 28, 2021Updated 4 years ago
- Utilities for MITRE™ ATT&CK☆1,049Jan 3, 2026Updated 4 months ago
- ☆362Apr 24, 2021Updated 5 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,495May 9, 2026Updated last week