The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resource to know about the tests, it's execution, detection and defense techniques from MITRE Shield.
☆34Jun 19, 2025Updated 9 months ago
Alternatives and similar repositories for TheAtomicPlaybook
Users that are interested in TheAtomicPlaybook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- My personal website, built with Next.js, Tailwind CSS, and Radix UI. Deployed on Vercel.☆13Oct 22, 2024Updated last year
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆36May 20, 2020Updated 5 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆218Apr 26, 2022Updated 3 years ago
- Mobirise plugin using Google Firebase☆10Oct 6, 2017Updated 8 years ago
- Supercharged USB bootloader for various PIC24/dsPIC33 MCUs.☆12Jul 8, 2021Updated 4 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Class☆10Nov 10, 2020Updated 5 years ago
- ☆50Oct 14, 2025Updated 5 months ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A R Package for Property Tax analysis☆11Dec 22, 2025Updated 3 months ago
- Fast, zero-copy HTML Parser written in Rust☆25Dec 6, 2025Updated 3 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Easy-to-use C++ library for the new Linux GPIO API☆12Dec 10, 2020Updated 5 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- ☆48Jun 6, 2025Updated 9 months ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- My collection of Bookmarks☆13Dec 29, 2025Updated 2 months ago
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated last year
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- .Net Assembly loader for the GMSAPasswordReader☆19Feb 15, 2023Updated 3 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago