punk-security / pwnspoofLinks
Pwnspoof repository
☆265Updated 2 years ago
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below
Sorting:
- Repository resource for threat hunter☆158Updated 7 years ago
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆168Updated 11 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 3 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆123Updated 2 years ago
- Useful resources about phishing email analysis☆87Updated 9 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆136Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 5 months ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- An open-source self-hosted purple team management web application.☆292Updated last month
- Ansible playbook to deploy a phishing engagement in the cloud.☆222Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 2 weeks ago
- ☆173Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆254Updated 3 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆158Updated 2 years ago
- A semi-curated list of Security Feeds☆142Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆337Updated 2 weeks ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- ☆122Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆200Updated this week
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Updated last year
- ☆160Updated last year
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated last year