☆20Feb 22, 2021Updated 5 years ago
Alternatives and similar repositories for HomeLab
Users that are interested in HomeLab are comparing it to the libraries listed below
Sorting:
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- ☆12Oct 15, 2024Updated last year
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆14Oct 24, 2024Updated last year
- ☆13Dec 22, 2017Updated 8 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 8 months ago
- ☆34Apr 29, 2021Updated 4 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ☆13Jan 15, 2019Updated 7 years ago
- The New Windows Installer for FusionInventory Agent☆11Mar 3, 2022Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142May 23, 2020Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- A more obfuscated CactusTorch targeted towards office☆31Feb 4, 2021Updated 5 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆201Jun 19, 2020Updated 5 years ago