AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
☆50Apr 27, 2026Updated last week
Alternatives and similar repositories for attackmate
Users that are interested in attackmate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Share secrets encrypted☆15Apr 28, 2026Updated last week
- This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited…☆90Jan 12, 2026Updated 3 months ago
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆11Apr 22, 2022Updated 4 years ago
- Taranis AI is an advanced Open-Source Intelligence (OSINT) tool, leveraging Artificial Intelligence to revolutionize information gatherin…☆1,010Updated this week
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆31Jul 9, 2025Updated 10 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- ☆10Aug 27, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- pbcopy(1) replacement that marks data as confidential☆23Jun 19, 2019Updated 6 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year
- Includes simple docker structure for machine learning projects.☆14Feb 8, 2023Updated 3 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Print the uncompressed size of a GZip file.☆14Sep 16, 2019Updated 6 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆30Nov 26, 2024Updated last year
- BloodHound Automation: Collection, Analysis and Data Import☆21Nov 12, 2025Updated 5 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆18Aug 9, 2024Updated last year
- Windows_Exfil** is a proof-of-concept script for automating data collection and exfiltration via Flipper Zero🐬configured as a "BadUSB." …☆21Dec 26, 2024Updated last year
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆209Feb 16, 2026Updated 2 months ago
- A browserless HTML testing library for Python.☆22Dec 3, 2025Updated 5 months ago
- A Selenium scraper for public domain search tools.☆18Oct 27, 2024Updated last year
- Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/☆11Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆18Feb 19, 2026Updated 2 months ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- 利用angr去除ollvm的虚假控制流☆14Mar 20, 2021Updated 5 years ago
- CP-APR Tensor Decomposition with PyTorch backend. pyCP_APR can perform non-negative Poisson Tensor Factorization on GPU, and includes an …☆19Dec 18, 2023Updated 2 years ago
- Codebase used to generate the results for NeurIPS23 "Adversarial Training for Graph Neural Networks: Pitfalls, Solutions, and New Directi…☆13Dec 8, 2023Updated 2 years ago
- This project focuses on detecting cyberattacks using advanced analytical techniques and a deep learning model. It leverages structured da…☆10Feb 21, 2025Updated last year
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- HTML Form to Dict☆17Oct 20, 2022Updated 3 years ago
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 3 years ago
- ☆12Oct 10, 2024Updated last year
- ☆19Dec 18, 2024Updated last year
- ☆13Jun 26, 2021Updated 4 years ago