clr2of8 / AtomicRunnerLinks
☆12Updated 2 months ago
Alternatives and similar repositories for AtomicRunner
Users that are interested in AtomicRunner are comparing it to the libraries listed below
Sorting:
- Threat Mitigation Strategies☆25Updated last year
- Kerberoast Detection Script☆30Updated 7 months ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆53Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- ☆48Updated 5 years ago
- Resources and Discussions About Detection Engineering☆12Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- Windows Security Logging☆43Updated 2 years ago
- ☆25Updated 3 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆94Updated 2 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- C# User Simulation☆32Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- Continuous kerberoast monitor☆45Updated last year
- Ansible role that Installs Mythic☆17Updated last year
- ☆13Updated last year