Automated Tactics Techniques & Procedures
☆261May 26, 2023Updated 2 years ago
Alternatives and similar repositories for AutoTTP
Users that are interested in AutoTTP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- ☆1,094May 1, 2019Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Remote Recon and Collection☆461Nov 23, 2017Updated 8 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆732Jan 21, 2020Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- ☆350Mar 19, 2021Updated 5 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98May 12, 2018Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 8 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆142Mar 7, 2018Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 6 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Utilities for MITRE™ ATT&CK☆1,049Jan 3, 2026Updated 4 months ago
- ☆99May 3, 2018Updated 8 years ago
- Collection of PowerShell scripts☆452Dec 18, 2017Updated 8 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Issues to consider when planning a red team exercise.☆612Aug 23, 2017Updated 8 years ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆636Jun 20, 2017Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,176Apr 22, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,636Apr 28, 2026Updated 3 weeks ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,660Jun 6, 2024Updated last year
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,455Nov 20, 2025Updated 6 months ago
- Simulating Adversary Operations☆98Apr 13, 2018Updated 8 years ago