The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resource to know about the tests, it's execution, detection and defense techniques from MITRE Shield.
☆34Jun 19, 2025Updated 10 months ago
Alternatives and similar repositories for TheAtomicPlaybook
Users that are interested in TheAtomicPlaybook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆37May 20, 2020Updated 5 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- Landing page for MAEC docs☆23Oct 22, 2022Updated 3 years ago
- Mobirise plugin using Google Firebase☆10Oct 6, 2017Updated 8 years ago
- Supercharged USB bootloader for various PIC24/dsPIC33 MCUs.☆12Jul 8, 2021Updated 4 years ago
- ☆28Mar 29, 2022Updated 4 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- ☆50Oct 14, 2025Updated 6 months ago
- Blog/Journal on how to backdoor VSCode extensions☆79Feb 24, 2026Updated 2 months ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A R Package for Property Tax analysis☆11Dec 22, 2025Updated 4 months ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Easy-to-use C++ library for the new Linux GPIO API☆12Dec 10, 2020Updated 5 years ago
- SensePost's modified hostapd for wifi attacks.☆13Oct 11, 2020Updated 5 years ago
- Fast, zero-copy HTML Parser written in Rust☆28Dec 6, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆50Jun 6, 2025Updated 11 months ago
- My collection of Bookmarks☆13Dec 29, 2025Updated 4 months ago
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- A red teaming attack paradigm against AI Agents☆33Mar 9, 2025Updated last year
- Your one-stop shop for everything you need to know during #Hack weekend.☆11May 31, 2019Updated 6 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Simple Tool Caller for llama.cpp☆11Aug 12, 2024Updated last year
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- ☆11Jun 2, 2021Updated 4 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- radiotap parser C library☆12Jul 24, 2021Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆34Apr 15, 2021Updated 5 years ago
- commandline linux usbmon interface☆19Sep 24, 2014Updated 11 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago