SPECTRE enables GHOSTS clients to have and build individual preferences over time.
☆20Jun 20, 2023Updated 2 years ago
Alternatives and similar repositories for GHOSTS-SPECTRE
Users that are interested in GHOSTS-SPECTRE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GHOSTS Animator is a library and API for generating realistic NPCs for training and exercise.☆26Feb 21, 2024Updated 2 years ago
- GHOSTS is a realistic user simulation framework for cyber experimentation, simulation, training, and exercise☆676Updated this week
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- GDI malware☆10Jul 13, 2021Updated 4 years ago
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆13Jun 5, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Obfuscate URLs (can be used in requests).☆17Aug 16, 2023Updated 2 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Demonstrating how to sign .net assemblies and nuget packages in azdo☆16Feb 23, 2022Updated 4 years ago
- Code editor control for Universal Dashboard.☆10Jan 6, 2023Updated 3 years ago
- Script to gather Auditpol data forest wide as well as various other Audit Metadata from DC's, Servers and Workstations.☆12Jul 6, 2017Updated 8 years ago
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆230May 24, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆15Feb 17, 2024Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Random Powershell scripts☆13Feb 13, 2024Updated 2 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Mar 24, 2026Updated 2 weeks ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- The Core Flight System (cFS) Stored Command Absolute (SCA) application.☆20Mar 4, 2019Updated 7 years ago
- macOS dylib stager☆36Jan 22, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Slides from out talk at BH IL 2022☆29Mar 21, 2022Updated 4 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Two-Axis Az/El rotor using portable satellite antenna☆21Jan 25, 2025Updated last year
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- ☆19Jun 19, 2023Updated 2 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 3 months ago
- Official documentation for TheHive Project applications☆21Sep 29, 2023Updated 2 years ago
- ☆32Jun 1, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Hands-on lab workshop, Azure Defender for IoT☆14Feb 2, 2022Updated 4 years ago
- ☆21May 17, 2023Updated 2 years ago
- ☆16Mar 18, 2023Updated 3 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- A collection of plain text or csv formatted public domain word lists.☆20Jun 10, 2017Updated 8 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago