Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.
☆47Jan 22, 2025Updated last year
Alternatives and similar repositories for Invoke-AtomicAssessment
Users that are interested in Invoke-AtomicAssessment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 4 months ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 9 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆131Dec 2, 2023Updated 2 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆210Dec 25, 2024Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 3 months ago
- Everything related to YARA☆16Apr 18, 2026Updated 3 weeks ago
- Explore and filter your GitHub starred repositories☆24Dec 5, 2023Updated 2 years ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 4 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆39Jan 2, 2025Updated last year
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆53Jun 21, 2025Updated 10 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- HTML Smuggling with Web Assembly☆74Feb 20, 2024Updated 2 years ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 6 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- ☆32Dec 5, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- SAM Dumping in C#☆55Nov 27, 2025Updated 5 months ago
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year
- Simple C# Redirector☆94Aug 31, 2025Updated 8 months ago
- Slides of my public talks☆63Feb 20, 2026Updated 2 months ago
- Bunch of BOF files☆41Jun 30, 2025Updated 10 months ago
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 10 months ago
- ☆84Feb 4, 2026Updated 3 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 5 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆170Nov 17, 2025Updated 5 months ago