A Caldera plugin for the emulation of complete, realistic cyberattack chains.
☆66Nov 19, 2025Updated 5 months ago
Alternatives and similar repositories for bountyhunter
Users that are interested in bountyhunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A comprehensive local Linux Privilege-Escalation Benchmark☆46Nov 7, 2025Updated 5 months ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated last month
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆206Nov 23, 2025Updated 4 months ago
- Scripts to generate and analyze the AIT alert data set (AIT-ADS)☆29Jul 9, 2025Updated 9 months ago
- Purple-team telemetry & simulation toolkit.☆113Dec 16, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Feb 12, 2026Updated 2 months ago
- A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networ…☆56Mar 16, 2026Updated last month
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- source code for the offsecml framework☆44Jun 6, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆244Dec 22, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- ☆170Sep 30, 2025Updated 6 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆55Feb 16, 2026Updated 2 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆176Jan 9, 2026Updated 3 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Apr 11, 2026Updated last week
- A library for intercepting system calls☆103Jan 5, 2025Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,066Mar 10, 2026Updated last month
- AI featured threat modeling and security review action☆46Nov 17, 2024Updated last year
- Automated Adversary Emulation Platform☆6,886Apr 10, 2026Updated last week
- A collection of mobile networking tools and resources for the UK and the rest of the world.☆14Mar 16, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Spike, a RISC-V ISA Simulator☆10Jan 22, 2026Updated 2 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆159Updated this week
- Unauthenticated enumeration of AWS IAM Roles.☆26Updated this week
- ☆38Jan 30, 2025Updated last year
- ☆15May 17, 2018Updated 7 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,092May 28, 2025Updated 10 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year