ait-testbed / attackmateLinks
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
☆38Updated 3 weeks ago
Alternatives and similar repositories for attackmate
Users that are interested in attackmate are comparing it to the libraries listed below
Sorting:
- PowerShell Script Analyzer☆69Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆39Updated last year
- Search for c2 servers based on netlas☆39Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆85Updated last month
- create a "simulated internet" cyber range environment☆17Updated last month
- JA4TScan is an active TCP server fingerprinting tool.☆84Updated 10 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated last month
- Interactive, dynamic, and realistic LLM honeypots☆52Updated 5 months ago
- Open IOC sharing platform☆56Updated 8 months ago
- yara detection rules for hunting with the threathunting-keywords project☆124Updated 2 months ago
- this repo is for red team process and tools collection☆24Updated 3 years ago
- ☆27Updated 7 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 8 months ago
- A Golang CLI for the MITRE ATT&CK Framework☆13Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆71Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆127Updated 5 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- A command and control (C2) server☆57Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- An Adaptive Misuse Detection System☆42Updated 8 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Worlds First Public POC for CVE-2025-1974☆89Updated 3 months ago
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆83Updated this week