Telefonica / ATTPwnLinks
ATTPwn
☆217Updated last year
Alternatives and similar repositories for ATTPwn
Users that are interested in ATTPwn are comparing it to the libraries listed below
Sorting:
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 4 years ago
- Active Directory Lab for Penetration Testing☆53Updated 5 months ago
- A PowerShell module to deploy active directory decoy objects.☆238Updated 6 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆340Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- Disposable and resilient red team infrastructure with Terraform☆280Updated 6 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆242Updated 5 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆161Updated 2 weeks ago
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- Misc Threat Hunting Resources☆376Updated 2 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆342Updated 7 years ago
- Atomic Purple Team Framework and Lifecycle☆300Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- A curated list of awesome BloodhoundAD resources☆237Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆400Updated last year
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- ☆333Updated 3 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 3 years ago
- ☆398Updated 3 weeks ago
- Miscellaneous tools for BloodHound☆402Updated last year
- ☆167Updated 5 years ago
- ☆284Updated 8 years ago
- Credential and Red Teaming Defense for Windows Environments☆328Updated last year