"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event…
☆1,035May 27, 2020Updated 5 years ago
Alternatives and similar repositories for DumpsterFire
Users that are interested in DumpsterFire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 7 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,658Nov 24, 2020Updated 5 years ago
- ☆1,091May 1, 2019Updated 6 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,723Sep 23, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated Tactics Techniques & Procedures☆260May 26, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,518Jan 12, 2026Updated 2 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Automated Adversary Emulation Platform☆6,868Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆4,467Oct 1, 2025Updated 6 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,361Apr 4, 2024Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,932Jul 6, 2024Updated last year
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,429Nov 16, 2023Updated 2 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,621Jan 23, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,147Oct 19, 2025Updated 5 months ago
- DARKSURGEON is a Windows packer project to empower incident response, digital forensics, malware analysis, and network defense.☆471Jul 21, 2020Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,511Jan 12, 2026Updated 2 months ago
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Jun 3, 2021Updated 4 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,617Dec 10, 2018Updated 7 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆699Aug 9, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆938Dec 12, 2023Updated 2 years ago
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 5 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,189Dec 11, 2022Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,269Nov 20, 2025Updated 4 months ago