Repo containing docker-compose files and setup scripts without having to clone the individual reternal components
☆111Mar 25, 2021Updated 5 years ago
Alternatives and similar repositories for reternal-quickstart
Users that are interested in reternal-quickstart are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Mar 30, 2026Updated last week
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Aug 10, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆25May 9, 2021Updated 4 years ago
- ☆26Apr 5, 2020Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automated Tactics Techniques & Procedures☆261May 26, 2023Updated 2 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆401Feb 27, 2024Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆319Dec 8, 2022Updated 3 years ago
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆132Aug 10, 2021Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- ☆1,090May 1, 2019Updated 6 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dashboards for conducting forensic investigation using windows events in Kibana☆18Apr 6, 2019Updated 7 years ago
- Fake User Generator for Active Directory Environments☆158Sep 28, 2018Updated 7 years ago
- ☆171May 20, 2021Updated 4 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,136Apr 1, 2019Updated 7 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,561Apr 3, 2026Updated last week
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆88Jan 11, 2024Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- ☆169Dec 8, 2022Updated 3 years ago