Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.
☆47Jan 22, 2025Updated last year
Alternatives and similar repositories for Invoke-AtomicAssessment
Users that are interested in Invoke-AtomicAssessment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 3 months ago
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 3 months ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 7 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆96Jan 27, 2026Updated 2 months ago
- Everything related to YARA☆16Feb 19, 2026Updated last month
- Explore and filter your GitHub starred repositories☆25Dec 5, 2023Updated 2 years ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 9 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated 2 years ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆31Dec 5, 2024Updated last year
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- Efflanrs - GUI for Snaffler Output☆26Sep 13, 2024Updated last year
- SAM Dumping in C#☆55Nov 27, 2025Updated 4 months ago
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- Find potential DLL Sideloads on your windows computer☆220Jan 12, 2025Updated last year
- Slides of my public talks☆63Feb 20, 2026Updated last month
- Bunch of BOF files☆40Jun 30, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated 2 weeks ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 9 months ago
- ☆80Feb 4, 2026Updated last month
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆322Aug 8, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆138Dec 7, 2025Updated 3 months ago