ATTPwn
☆218Mar 9, 2024Updated 2 years ago
Alternatives and similar repositories for ATTPwn
Users that are interested in ATTPwn are comparing it to the libraries listed below
Sorting:
- ☆12Nov 25, 2020Updated 5 years ago
- Tool to deploy a post-exploitation prompt at any time☆321May 28, 2021Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆628May 28, 2024Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆342May 2, 2023Updated 2 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated 3 weeks ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆245Dec 10, 2020Updated 5 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,554Mar 12, 2026Updated last week
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated 2 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- ☆12Sep 10, 2022Updated 3 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Audit Windows Security with best Practice☆192Sep 25, 2024Updated last year
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆36May 20, 2020Updated 5 years ago
- Atomic Purple Team Framework and Lifecycle☆299Feb 11, 2021Updated 5 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆730Jan 21, 2020Updated 6 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- Technical Tabletop Exercises Simulation Framework☆48Oct 30, 2023Updated 2 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆608Nov 28, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 5 months ago
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆39Jul 29, 2021Updated 4 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- easy-to-use payload hosting☆275Apr 22, 2022Updated 3 years ago
- Password Spraying Framework☆64Jun 9, 2022Updated 3 years ago
- ☆107May 28, 2021Updated 4 years ago
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated 2 months ago