infosecn1nja / Invoke-AtomicAssessmentLinks
Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.
☆42Updated 7 months ago
Alternatives and similar repositories for Invoke-AtomicAssessment
Users that are interested in Invoke-AtomicAssessment are comparing it to the libraries listed below
Sorting:
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆55Updated 6 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 3 weeks ago
- Claude MCP server to perform analysis on ROADrecon data☆45Updated 5 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆87Updated last month
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- ☆24Updated 6 months ago
- Payload Generation Workflow☆40Updated last month
- MSIX Building Made Easy for Defenders☆33Updated 3 weeks ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- Addon for BHCE☆54Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- ☆41Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 9 months ago
- ☆53Updated 3 months ago
- IP address filter by City☆11Updated 8 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 8 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- Automatically deploy Nemesis☆21Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- BloodHound PowerShell client☆64Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Persist like a Dodder☆64Updated 3 months ago
- create a "simulated internet" cyber range environment☆18Updated 3 months ago
- ☆52Updated last year
- ☆35Updated 3 months ago