☆20Feb 22, 2021Updated 5 years ago
Alternatives and similar repositories for HomeLab
Users that are interested in HomeLab are comparing it to the libraries listed below
Sorting:
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- ☆12Oct 15, 2024Updated last year
- ☆14Jun 2, 2025Updated 8 months ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- ☆13Dec 22, 2017Updated 8 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- ☆14Oct 24, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- ☆153Mar 26, 2025Updated 11 months ago
- ☆22May 11, 2022Updated 3 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- ☆32May 14, 2018Updated 7 years ago
- Python Script for SAML2 Authentication Passwordspray☆41Jul 5, 2023Updated 2 years ago
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- ☆36Aug 21, 2024Updated last year
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- .NET 4.0 Console App to browse VMDK / VHD images and extract files☆201Jun 19, 2020Updated 5 years ago
- an awesome list of active defense resources☆129Jul 11, 2020Updated 5 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Updated this week
- Purple Team Security☆76Mar 24, 2022Updated 3 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs☆30Jun 13, 2019Updated 6 years ago