Graphical map of known Advanced Persistent Threats
☆62Jan 31, 2026Updated last month
Alternatives and similar repositories for APTmap
Users that are interested in APTmap are comparing it to the libraries listed below
Sorting:
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆16Feb 26, 2022Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- Template para proyectos de Pentesting y registrar el contenido en un Vault de Obsidian☆14Aug 5, 2021Updated 4 years ago
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- ☆48Jul 19, 2024Updated last year
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- ☆48Nov 14, 2021Updated 4 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆23Mar 31, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- An Opencode plugin for managing git worktrees.☆58Updated this week
- My PowerShell bag of tricks☆26Aug 2, 2017Updated 8 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆27Jan 5, 2021Updated 5 years ago
- Windows Event Log Knowledge Base☆31Dec 23, 2025Updated 2 months ago
- Hacker calendar 2024 in high resolution + template + some editing tips☆22Jan 2, 2024Updated 2 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108May 17, 2022Updated 3 years ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆153Updated this week
- ☆10Feb 23, 2026Updated last week
- ☆11Sep 15, 2024Updated last year
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆35Feb 2, 2022Updated 4 years ago
- Powershell MS Outlook enumeration and phishing tool☆77May 26, 2016Updated 9 years ago
- ☆41Aug 8, 2023Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Parse SDDL strings☆37Apr 1, 2024Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆227Jul 19, 2024Updated last year
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago