☆2,666Mar 5, 2024Updated 2 years ago
Alternatives and similar repositories for red_team_tool_countermeasures
Users that are interested in red_team_tool_countermeasures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆560Jun 1, 2023Updated 2 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,546Oct 16, 2025Updated 5 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Updated this week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- Defences against Cobalt Strike☆1,298Jul 14, 2022Updated 3 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,384Mar 16, 2026Updated last week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,649Jul 18, 2024Updated last year
- Repository of yara rules☆4,730Apr 17, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆4,463Oct 1, 2025Updated 5 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- 红队作战中比较常遇到的一些重点系统漏洞整理。☆2,521Jul 17, 2021Updated 4 years ago
- Main Sigma Rule Repository☆10,224Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- Red Teaming Tactics and Techniques☆4,515Aug 22, 2024Updated last year
- Automated Adversary Emulation Platform☆6,831Updated this week
- ☆1,134Dec 19, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,284Nov 3, 2020Updated 5 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- ☆1,379Jul 2, 2020Updated 5 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Oct 9, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- Test tool for CVE-2020-1472☆1,806Jun 27, 2025Updated 8 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,740Jan 16, 2026Updated 2 months ago
- Open EDR public repository☆2,623Jan 13, 2024Updated 2 years ago
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- List of Awesome CobaltStrike Resources☆4,395Sep 20, 2023Updated 2 years ago
- generate CobaltStrike's cross-platform payload☆2,547Nov 20, 2023Updated 2 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,617Jun 11, 2021Updated 4 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 3 months ago
- Trying to tame the three-headed dog.☆4,935Nov 14, 2025Updated 4 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,955Mar 17, 2026Updated last week