Telefonica / ATTPwn
ATTPwn
☆213Updated last year
Alternatives and similar repositories for ATTPwn:
Users that are interested in ATTPwn are comparing it to the libraries listed below
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆239Updated 4 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- thethe☆116Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- Parse .nessus file(s) and shows output in interactive UI☆149Updated 10 months ago
- Build a attack range in your local machine☆130Updated last year
- Collection of created MindMaps☆150Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆40Updated 4 years ago
- Picus Labs☆44Updated 4 years ago
- A PowerShell module to deploy active directory decoy objects.☆227Updated 5 years ago
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- ☆167Updated 5 years ago
- Mindmaps for threat hunting - work in progress.☆150Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆231Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 4 years ago
- Miscellaneous tools for BloodHound☆389Updated 8 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆294Updated 5 months ago
- Disposable and resilient red team infrastructure with Terraform☆263Updated 6 years ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- LinkedIn reconnaissance tool☆51Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆252Updated 2 years ago
- List of Repositories☆96Updated 3 years ago
- ☆69Updated 3 years ago
- Linux Incident Response☆90Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆65Updated 3 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆252Updated 3 years ago