Telefonica / ATTPwnLinks
ATTPwn
☆215Updated last year
Alternatives and similar repositories for ATTPwn
Users that are interested in ATTPwn are comparing it to the libraries listed below
Sorting:
- Active Directory Lab for Penetration Testing☆52Updated 2 months ago
- Purple Teaming Attack & Hunt Lab - Terraform☆160Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆233Updated 5 years ago
- Collection of created MindMaps☆151Updated last year
- A modular OSINT honeypot for blue teamers☆338Updated 2 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆230Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆220Updated 3 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- Disposable and resilient red team infrastructure with Terraform☆274Updated 6 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- Parse .nessus file(s) and shows output in interactive UI☆157Updated 4 months ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- A Docker container for remote penetration testing.☆138Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆338Updated 6 years ago
- Atomic Purple Team Framework and Lifecycle☆298Updated 4 years ago
- ☆169Updated 5 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆244Updated 4 years ago
- ☆69Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆236Updated 2 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Updated 4 years ago
- ☆282Updated 7 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆398Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated last month
- ☆333Updated 2 years ago
- Miscellaneous tools for BloodHound☆397Updated last year