guardicore / monkey
Infection Monkey - An open-source adversary emulation platform
☆6,754Updated 3 weeks ago
Alternatives and similar repositories for monkey:
Users that are interested in monkey are comparing it to the libraries listed below
- Automated Adversary Emulation Platform☆5,946Updated this week
- Open Source Vulnerability Management Platform☆5,300Updated last week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,180Updated 3 weeks ago
- A Workflow Engine for Offensive Security☆5,522Updated last month
- Attack Surface Management Platform☆8,559Updated 3 weeks ago
- Official Black Hat Arsenal Security Tools Repository☆4,015Updated 6 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,158Updated 9 months ago
- an awesome list of honeypot resources☆8,999Updated 7 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,181Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,384Updated 6 months ago
- A curated list of tools for incident response☆8,000Updated 8 months ago
- A swiss army knife for pentesting networks☆8,633Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,621Updated 4 years ago
- Adversary Emulation Framework☆9,063Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆5,603Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,650Updated last week
- Automated Mass Exploiter☆5,089Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,565Updated 5 years ago
- Reconnaissance tool for GitHub organizations☆6,014Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,064Updated 10 months ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,322Updated 5 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,235Updated 11 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,631Updated last year
- ☆2,661Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,237Updated 6 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,546Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,710Updated last week
- A collection of custom security tools for quick needs.☆3,179Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,433Updated last month
- A curated list of Awesome Threat Intelligence resources☆8,565Updated 7 months ago