"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event…
☆1,035May 27, 2020Updated 5 years ago
Alternatives and similar repositories for DumpsterFire
Users that are interested in DumpsterFire are comparing it to the libraries listed below
Sorting:
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 6 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,652Nov 24, 2020Updated 5 years ago
- ☆1,090May 1, 2019Updated 6 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,719Sep 23, 2025Updated 5 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,495Jan 12, 2026Updated 2 months ago
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,450Nov 3, 2018Updated 7 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- Automated Adversary Emulation Platform☆6,811Mar 9, 2026Updated last week
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,917Jul 6, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,688Updated this week
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆657Aug 19, 2019Updated 6 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,621Jan 23, 2024Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,137Oct 19, 2025Updated 4 months ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated 2 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆730Jan 21, 2020Updated 6 years ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,187Dec 11, 2022Updated 3 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,360Apr 4, 2024Updated last year
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Re-play Security Events☆1,728Mar 20, 2024Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Jun 3, 2021Updated 4 years ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆470Jul 21, 2020Updated 5 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,112Apr 26, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,234Nov 20, 2025Updated 3 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,615Dec 10, 2018Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆699Aug 9, 2023Updated 2 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆843Jun 25, 2024Updated last year