PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpose of generating attack telemetry in properly monitored Windows enterprise environments
☆51Aug 15, 2019Updated 6 years ago
Alternatives and similar repositories for PurpleSpray
Users that are interested in PurpleSpray are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Random scripts that I used in the CARTP course lab & final exam.☆14Feb 28, 2024Updated 2 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- ☆11Jun 26, 2024Updated last year
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Apr 28, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆67Dec 19, 2018Updated 7 years ago
- Resolvn Threat Hunting Virtual Machine☆139Aug 16, 2019Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- ☆166Feb 13, 2020Updated 6 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago