A collection of tools adversaries commonly use in an attack.
☆14Nov 23, 2024Updated last year
Alternatives and similar repositories for adversarial-tools
Users that are interested in adversarial-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Jul 7, 2018Updated 7 years ago
- ☆20May 30, 2025Updated 9 months ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Jitsi Prometheus Exporter (JPE)☆31Jan 20, 2022Updated 4 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆21Oct 30, 2020Updated 5 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- ☆19Oct 22, 2025Updated 5 months ago
- ☆28Mar 29, 2022Updated 3 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- ☆22Feb 25, 2026Updated 3 weeks ago
- ☆28Jul 5, 2025Updated 8 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Research on abusing GitLab Runners☆31Jul 14, 2020Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆24Jun 29, 2021Updated 4 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- A simple DuckDuckGo URL scraper.☆32Feb 9, 2024Updated 2 years ago