Telefonica / ATTPwn
ATTPwn
☆213Updated last year
Alternatives and similar repositories for ATTPwn:
Users that are interested in ATTPwn are comparing it to the libraries listed below
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆239Updated 4 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- A PowerShell module to deploy active directory decoy objects.☆225Updated 5 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago
- Disposable and resilient red team infrastructure with Terraform☆264Updated 6 years ago
- ☆281Updated 7 years ago
- thethe☆116Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 4 years ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆150Updated 11 months ago
- Collection of created MindMaps☆151Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆296Updated 5 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆395Updated last year
- A curated list of awesome BloodhoundAD resources☆231Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- ☆167Updated 5 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆252Updated 3 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 6 years ago
- Credential and Red Teaming Defense for Windows Environments☆325Updated 8 months ago
- Miscellaneous tools for BloodHound☆390Updated 8 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆335Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- ☆379Updated 2 weeks ago
- Tool Analysis Result Sheet☆347Updated 7 years ago