Telefonica / ATTPwnLinks
ATTPwn
☆215Updated last year
Alternatives and similar repositories for ATTPwn
Users that are interested in ATTPwn are comparing it to the libraries listed below
Sorting:
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- Active Directory Lab for Penetration Testing☆52Updated last month
- Collection of created MindMaps☆150Updated last year
- A modular OSINT honeypot for blue teamers☆338Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆233Updated 5 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 2 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆155Updated 3 months ago
- An open source swiss army knife for arbitrary communication over application protocols☆242Updated 4 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆220Updated 3 years ago
- Atomic Purple Team Framework and Lifecycle☆299Updated 4 years ago
- Linux Incident Response☆90Updated 5 years ago
- thethe☆116Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated 2 weeks ago
- ☆69Updated 3 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆337Updated 6 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆254Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Threat Hunting tool about Sysmon and graphs☆334Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆271Updated 6 years ago
- Picus Labs☆44Updated 4 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆202Updated 4 years ago
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago
- A Docker container for remote penetration testing.☆138Updated 4 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago