A CALDERA plugin
☆18Jul 28, 2020Updated 5 years ago
Alternatives and similar repositories for adversary
Users that are interested in adversary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Dec 19, 2017Updated 8 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆13Feb 24, 2020Updated 6 years ago
- A CALDERA plugin☆76Apr 8, 2026Updated last month
- A CALDERA plugin☆82Apr 30, 2026Updated 3 weeks ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 5 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31May 11, 2026Updated last week
- ☆10Jul 2, 2020Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 5 months ago
- ☆11Oct 13, 2020Updated 5 years ago
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version☆22Mar 2, 2026Updated 2 months ago
- A dashboard framework for visualizing complex data sets on T1V multi-panel displays☆22Jan 4, 2023Updated 3 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 7 months ago
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆13Dec 14, 2021Updated 4 years ago
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Apr 30, 2026Updated 3 weeks ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- Large-Scale Sequence Mining with Hierarchies☆13Mar 13, 2015Updated 11 years ago
- A minifilter driver to capture processes behavior from a filesystem prospective.☆17Oct 5, 2024Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆12Aug 7, 2023Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Mar 1, 2024Updated 2 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Mar 1, 2026Updated 2 months ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago