nuryslyrt / AttackImaginator
LLM Supported Attack Scenario Creator from Code Review
☆12Updated 4 months ago
Alternatives and similar repositories for AttackImaginator:
Users that are interested in AttackImaginator are comparing it to the libraries listed below
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆75Updated 4 months ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 5 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- using graph proxy to monitor teams user presence☆54Updated 8 months ago
- Enumerate AWS permissions and resources.☆67Updated 2 years ago
- Living Off Security Tools☆45Updated 4 months ago
- ☆33Updated 2 months ago
- A web security research tool for DOM testing☆19Updated this week
- Next generation fireprox AWS API endpoint creation utility.☆49Updated 2 years ago
- Artifact monitoring that ensures fairplay☆75Updated last month
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆53Updated 3 months ago
- tool for identifying guest relationships between companies☆84Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆126Updated 3 weeks ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 6 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆13Updated 6 months ago
- https://lolad-project.github.io/☆72Updated 2 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated last month
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 5 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 4 months ago
- ☆93Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆37Updated this week