A Caldera plugin for the emulation of complete, realistic cyberattack chains.
☆65Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for bountyhunter
Users that are interested in bountyhunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 4 months ago
- An Adaptive Misuse Detection System☆47Nov 4, 2024Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated 2 weeks ago
- Quantum Computing with Silq Programming, published by Packt☆16Jan 30, 2023Updated 3 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains several courses to learn about using and developing SAF capabilities☆14Updated this week
- Purple-team telemetry & simulation toolkit.☆111Dec 16, 2025Updated 3 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- ☆14Sep 11, 2023Updated 2 years ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated last month
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Jun 18, 2024Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆241Dec 22, 2025Updated 3 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- ☆169Sep 30, 2025Updated 6 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Mar 22, 2026Updated last week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆175Jan 9, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆118Aug 7, 2023Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Mar 22, 2026Updated last week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,059Mar 10, 2026Updated 2 weeks ago
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Automated Adversary Emulation Platform☆6,849Updated this week
- This repo is for the Ruby version of EyeWitness☆28Nov 18, 2014Updated 11 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Daily updates from leaked data search engines, aggregators and similar services.☆153Updated this week
- Unauthenticated enumeration of AWS IAM Roles.☆26Sep 7, 2025Updated 6 months ago
- ☆38Jan 30, 2025Updated last year