punk-security / pwnspoof
Pwnspoof repository
☆258Updated last year
Alternatives and similar repositories for pwnspoof:
Users that are interested in pwnspoof are comparing it to the libraries listed below
- Repository resource for threat hunter☆158Updated 6 years ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆145Updated 3 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆183Updated 8 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆209Updated 2 years ago
- Course repository for PowerShell for Pentesters Course☆427Updated 2 years ago
- ☆117Updated 11 months ago
- ☆169Updated last year
- Tools for simulating threats☆181Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆278Updated 6 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆457Updated 7 months ago
- Infrastructure Automation☆338Updated 10 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆323Updated 4 months ago
- MISP Playbooks☆186Updated 2 weeks ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆128Updated 2 years ago
- An active directory laboratory for penetration testing.☆130Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆239Updated 2 years ago
- Useful resources about phishing email analysis☆79Updated last month
- Atomic Purple Team Framework and Lifecycle☆292Updated 4 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆465Updated 3 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆641Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆249Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- ☆159Updated last year
- An open-source self-hosted purple team management web application.☆258Updated last month