A CALDERA plugin
☆26Oct 6, 2025Updated 5 months ago
Alternatives and similar repositories for access
Users that are interested in access are comparing it to the libraries listed below
Sorting:
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Apr 26, 2024Updated last year
- A CALDERA plugin☆27Updated this week
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Updated this week
- A CALDERA plugin☆75Updated this week
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- A CALDERA plugin for autonomous incident response☆27Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆52Updated this week
- Python 2 Module of the Week☆19Jan 30, 2021Updated 5 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Jun 13, 2022Updated 3 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆22Dec 7, 2019Updated 6 years ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 8 months ago
- PyTest Salt Plugin☆13Jan 27, 2020Updated 6 years ago
- Rust crate for obfuscating string literals.☆13Feb 2, 2023Updated 3 years ago
- Custom-built cybersecurity labs on your Google Cloud Project☆19Sep 11, 2024Updated last year
- A CALDERA plugin☆81Feb 17, 2026Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Mar 11, 2026Updated last week
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 7 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated 2 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Physioboard demonstrates iOS/Python/Web prototypes for "real-time" physiological data acquisition and visualization (i.e., skin conductan…☆17Apr 28, 2013Updated 12 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- CALDERA plugin for adversary emulation of AI-enabled systems☆117Aug 7, 2023Updated 2 years ago
- Entity component system geared for games☆17Jun 21, 2019Updated 6 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- This utility smart contact can be used to build DAPP which can lock LP Tokens or any BEP20 or ERC20 Tokens (Depends on deployment chain) …☆11Sep 30, 2021Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Dynamic authoritative name server☆15Apr 21, 2022Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- Enables Zeek to communicate with Tenzir☆11Jul 20, 2023Updated 2 years ago
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆12May 10, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- ☆10Updated this week