"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event…
☆1,035May 27, 2020Updated 5 years ago
Alternatives and similar repositories for DumpsterFire
Users that are interested in DumpsterFire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 7 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,658Nov 24, 2020Updated 5 years ago
- ☆1,092May 1, 2019Updated 6 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,735Sep 23, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- Automated Adversary Emulation Platform☆6,919Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆4,474Oct 1, 2025Updated 6 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,860Updated this week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,462Nov 3, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,363Apr 4, 2024Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆824Nov 3, 2017Updated 8 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,950Jul 6, 2024Updated last year
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,431Nov 16, 2023Updated 2 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,618Jan 23, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,167Updated this week
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆470Jul 21, 2020Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Jan 12, 2026Updated 3 months ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆648Jun 3, 2021Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,615Dec 10, 2018Updated 7 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆702Aug 9, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆940Dec 12, 2023Updated 2 years ago
- Issues to consider when planning a red team exercise.☆612Aug 23, 2017Updated 8 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,115Apr 26, 2020Updated 6 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,190Dec 11, 2022Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆558May 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,276Nov 20, 2025Updated 5 months ago