ahhh / Cybersecurity-TradecraftLinks
A repo to support the book
☆108Updated 4 years ago
Alternatives and similar repositories for Cybersecurity-Tradecraft
Users that are interested in Cybersecurity-Tradecraft are comparing it to the libraries listed below
Sorting:
- ☆100Updated 10 months ago
- ☆80Updated 5 years ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Fraktal's Ransomware Emulator☆102Updated last year
- ☆118Updated 4 months ago
- ☆69Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 2 years ago
- ☆117Updated 4 years ago
- ☆33Updated last year
- TA505+ Adversary Simulation☆65Updated 4 years ago
- ☆70Updated last year
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated 3 weeks ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆93Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 10 months ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- blame Huy☆42Updated 4 years ago
- ☆59Updated 2 years ago
- My conference presentations☆82Updated 3 weeks ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- ☆108Updated 3 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆104Updated 2 years ago
- ☆54Updated last year