Telefonica / ATTPwn
ATTPwn
☆212Updated last year
Alternatives and similar repositories for ATTPwn:
Users that are interested in ATTPwn are comparing it to the libraries listed below
- An open source swiss army knife for arbitrary communication over application protocols☆241Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- thethe☆116Updated 4 years ago
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- Basic C2 Server☆190Updated 3 years ago
- ☆169Updated 5 years ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆266Updated 6 years ago
- ☆282Updated 7 years ago
- Collection of created MindMaps☆150Updated last year
- Atomic Purple Team Framework and Lifecycle☆294Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆150Updated last week
- A PowerShell module to deploy active directory decoy objects.☆228Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Updated 4 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 7 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago
- Active Directory Purple Team Playbook☆108Updated 2 years ago
- ☆69Updated 3 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- Weaponizing Splunk with reverse and bind shells.☆182Updated 8 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆256Updated 2 years ago