dreadnode / conferences
☆16Updated 10 months ago
Alternatives and similar repositories for conferences:
Users that are interested in conferences are comparing it to the libraries listed below
- Minimal workflows☆17Updated 11 months ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆59Updated last year
- ☆15Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 2 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆35Updated last month
- Nemesis agent for Mythic☆26Updated 6 months ago
- SMB Audit Tool you were looking for☆21Updated last year
- a tiny program to consume from ETW providers for research☆46Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆37Updated this week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- ☆48Updated 4 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆75Updated 4 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆13Updated 2 months ago
- Scripts to enumerate and report on Entra Conditional Access☆26Updated 6 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆17Updated 7 months ago
- ☆24Updated 3 years ago
- ☆46Updated last year
- Machine learning enabled dropper☆26Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆23Updated last week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 2 weeks ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 4 months ago
- quASAR: ASAR manipulation made easy☆25Updated 2 years ago