lawndoc / RespotterLinks
Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.
β198Updated last month
Alternatives and similar repositories for Respotter
Users that are interested in Respotter are comparing it to the libraries listed below
Sorting:
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β78Updated 4 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β145Updated last month
- β74Updated this week
- Completely Risky Active-Directory Simulation Hubβ103Updated last year
- God Mode Detection Rulesβ134Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β191Updated 10 months ago
- A collection of CVEs weaponized by ransomware operatorsβ122Updated 3 weeks ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory Cβ¦β255Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.β191Updated 6 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you comβ¦β175Updated 3 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environmentβ¦β299Updated last week
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. Tβ¦β132Updated 7 months ago
- An ADCS honeypot to catch attackers in your internal network.β309Updated last year
- β37Updated 9 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β104Updated 2 years ago
- VirtualGHOST Detection Toolβ92Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04β115Updated last year
- An open-source self-hosted purple team management web application.β287Updated 3 weeks ago
- https://lolad-project.github.io/β80Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β167Updated 11 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. β¦β106Updated last month
- β246Updated 3 weeks ago
- A repository of credential stealer formatsβ225Updated 3 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.β145Updated last week
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ128Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.β171Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ82Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilitiesβ264Updated 5 months ago