infosecn1nja / Invoke-AtomicAssessmentView external linksLinks
Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.
☆46Jan 22, 2025Updated last year
Alternatives and similar repositories for Invoke-AtomicAssessment
Users that are interested in Invoke-AtomicAssessment are comparing it to the libraries listed below
Sorting:
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Dec 26, 2025Updated last month
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Extract the Procedures (TTP) from CTI reports☆15Dec 13, 2025Updated 2 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆20Nov 24, 2025Updated 2 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Jun 21, 2025Updated 7 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆125Dec 2, 2023Updated 2 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆208Dec 25, 2024Updated last year
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 6 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Jan 2, 2025Updated last year
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆92Jan 27, 2026Updated 2 weeks ago
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆13Jun 3, 2025Updated 8 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- SAM Dumping in C#☆54Nov 27, 2025Updated 2 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆15Sep 17, 2022Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- Slides of my public talks☆56Dec 13, 2023Updated 2 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- ☆49Updated this week
- Automated Evilginx phishlet creator Extension for Burpsuite☆62Jan 10, 2025Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆321Aug 8, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆266Apr 8, 2025Updated 10 months ago
- ☆15May 3, 2024Updated last year
- Seven different DLL injection techniques in one single project.☆13May 19, 2020Updated 5 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆14Jan 24, 2024Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Advanced test for proxy & waf☆13Sep 13, 2025Updated 5 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 8 months ago
- Find potential DLL Sideloads on your windows computer☆219Jan 12, 2025Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 7 months ago
- ☆31Dec 5, 2024Updated last year