☆12Apr 5, 2025Updated 10 months ago
Alternatives and similar repositories for Attacker_Infrastructure_Setup
Users that are interested in Attacker_Infrastructure_Setup are comparing it to the libraries listed below
Sorting:
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- MCP wrapper for Hashcat – automate hash cracking with natural language☆24Jun 5, 2025Updated 8 months ago
- ☆32Updated this week
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆15Feb 5, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆53Dec 9, 2025Updated 2 months ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Sp00fer blog post -☆24Jul 19, 2022Updated 3 years ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated 2 weeks ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- ☆12Oct 10, 2023Updated 2 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- ☆10Updated this week
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- A repo of scripts I find helpful for daily tasks.☆30Dec 8, 2025Updated 2 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- An example of COM hijacking using a proxy DLL.☆44Aug 17, 2021Updated 4 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- A Cobaltstrike container, built for Warhorse☆41Aug 8, 2024Updated last year
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- ☆14Updated this week
- ☆15Aug 21, 2021Updated 4 years ago
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- Domain Blocklist☆10Aug 21, 2024Updated last year
- ☆44Oct 11, 2025Updated 4 months ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year