TryCatchHCF / DumpsterFire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event…
☆984Updated 4 years ago
Related projects: ⓘ
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,234Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,089Updated 5 years ago
- ☆1,048Updated 5 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆712Updated 4 years ago
- A Python Package for Data Exfiltration☆754Updated 4 months ago
- Cheat sheets for various projects.☆1,028Updated 6 years ago
- Password spraying using AWS Lambda for IP rotation☆567Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,027Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,199Updated 4 years ago
- FAME Automates Malware Evaluation☆845Updated 2 weeks ago
- Domain Password Audit Tool for Pentesters☆891Updated 2 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,210Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆817Updated 6 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆437Updated 2 years ago
- A collection of sources of indicators of compromise.☆784Updated 2 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,587Updated 5 years ago
- A Powershell incident response framework☆1,544Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,692Updated 2 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,105Updated 4 years ago
- Incident Response Methodologies☆1,021Updated 6 years ago
- SimplE RePort wrIting and COllaboration tool☆1,092Updated 4 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆876Updated 3 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆540Updated 2 years ago
- A collection of resources for Threat Hunters☆845Updated 2 months ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,001Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆536Updated last year
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆489Updated last year
- Active Directory Assessment and Privilege Escalation Script☆1,090Updated last year
- HTA encryption tool for RedTeams☆1,362Updated last year
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,577Updated 7 months ago