ait-testbed / attackmateLinks
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
☆43Updated last week
Alternatives and similar repositories for attackmate
Users that are interested in attackmate are comparing it to the libraries listed below
Sorting:
- An Adaptive Misuse Detection System☆46Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 6 months ago
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆142Updated 2 weeks ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆133Updated this week
- PowerShell Script Analyzer☆70Updated 2 years ago
- Interactive, dynamic, and realistic LLM honeypots☆71Updated 10 months ago
- Detonate malware on VMs and get logs & detection status☆73Updated this week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 2 weeks ago
- Detect WFP filters blocking EDR communications☆96Updated last year
- https://lolad-project.github.io/☆84Updated 11 months ago
- Linux #rootkit and #malware revealer☆30Updated last year
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 9 months ago
- Covert data exfiltration via DNS☆50Updated 10 months ago
- ☆37Updated last year
- Look into EDR events from network☆25Updated last month
- ShellSweeping the evil.☆181Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- JavaScript for Automation (JXA) macOS agent☆88Updated 3 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆145Updated this week
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆21Updated last week
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆102Updated 10 months ago
- ☆139Updated last week
- Active C&C Detector☆156Updated 2 years ago