PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
☆843Feb 23, 2026Updated last month
Alternatives and similar repositories for PurpleSharp
Users that are interested in PurpleSharp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,460Updated this week
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,554Mar 12, 2026Updated last week
- Bloodhound Reporting for Blue and Purple Teams☆1,281Nov 15, 2025Updated 4 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 6 months ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,227Jun 7, 2023Updated 2 years ago
- C# Script used for Red Team☆723Nov 16, 2021Updated 4 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Jul 26, 2023Updated 2 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,384Feb 10, 2026Updated last month
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆667Jun 14, 2023Updated 2 years ago
- Miscellaneous Tools☆270Oct 29, 2020Updated 5 years ago
- Writing custom backdoor payloads with C# - Defcon 27 Workshop☆1,192Mar 18, 2022Updated 4 years ago
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,689Jan 8, 2024Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,740Jan 16, 2026Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Updated this week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- A repository of sysmon configuration modules☆2,996Aug 21, 2024Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,551Feb 5, 2026Updated last month
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆867Mar 20, 2023Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- ☆1,674Apr 14, 2025Updated 11 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆880Mar 29, 2021Updated 4 years ago
- ☆1,532Aug 11, 2023Updated 2 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,641Jul 18, 2024Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,397Jun 27, 2024Updated last year
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆540Sep 18, 2022Updated 3 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago