Telefonica / ATTPwn
ATTPwn
☆212Updated last year
Alternatives and similar repositories for ATTPwn:
Users that are interested in ATTPwn are comparing it to the libraries listed below
- An open source swiss army knife for arbitrary communication over application protocols☆240Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆228Updated 4 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆226Updated 5 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆255Updated 2 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆253Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Atomic Purple Team Framework and Lifecycle☆293Updated 4 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆324Updated 4 years ago
- LinkedIn reconnaissance tool☆51Updated 3 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆396Updated last year
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- ☆281Updated 7 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- ☆168Updated 5 years ago
- Collection of created MindMaps☆150Updated last year
- Disposable and resilient red team infrastructure with Terraform☆265Updated 6 years ago
- Weaponizing Splunk with reverse and bind shells.☆181Updated 8 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 2 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆150Updated last year
- Credential and Red Teaming Defense for Windows Environments☆327Updated 9 months ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆336Updated 6 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆100Updated 6 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆145Updated last year
- thethe☆116Updated 4 years ago