Small and highly portable detection tests.
☆13Apr 13, 2018Updated 7 years ago
Alternatives and similar repositories for atomic-red-team
Users that are interested in atomic-red-team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated last month
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆15May 29, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- iOS forensics utility☆13May 8, 2018Updated 7 years ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last month
- programming vocabulary in japanese☆16Aug 22, 2021Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Single Installer for all Red Hat Development Tools and more. Download it form Red Hat Developers Portal web site - http://developers.red…☆26Feb 4, 2026Updated last month
- Some cacti Templates I use and some that I have created☆11Jun 27, 2023Updated 2 years ago
- Plugin for Nautobot to support documentation of network tunneling protocols, ie VPNs, GRE, L2TP, etc.☆14Feb 14, 2022Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Hack South is a South Africa-based community for infosec professionals, security researchers, and students sharing insights, advice, and …☆14Nov 16, 2024Updated last year
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- DDIR: An Open Source Dataset for Darkweb Research☆15Oct 28, 2019Updated 6 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Configuration module to monitor nextcloud with serverinfo app☆11Nov 27, 2025Updated 4 months ago
- A stable Java API for interfacing with and extending OpenNMS☆14Jan 27, 2026Updated 2 months ago
- NetBox plugin to publish changes to Kafka.☆11Feb 1, 2023Updated 3 years ago
- [端口扫描器] 采用.NET开发的端口扫描器 支持端口协议探测 内置多种类型扫描器 TCP/UDP/SYN/SMB/ICMP 等 采用IOCP模型开发 性能表现不错 可视为轻量级NMAP☆37Mar 19, 2021Updated 5 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆19Dec 11, 2025Updated 3 months ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago