punk-security / pwnspoof
Pwnspoof repository
☆261Updated last year
Alternatives and similar repositories for pwnspoof:
Users that are interested in pwnspoof are comparing it to the libraries listed below
- Blue Team detection lab created with Terraform and Ansible in Azure.☆153Updated 5 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Tools for simulating threats☆183Updated last year
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆460Updated 9 months ago
- An active directory laboratory for penetration testing.☆131Updated 4 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆189Updated 9 months ago
- Infrastructure Automation☆345Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- Course repository for PowerShell for Pentesters Course☆431Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆481Updated 5 months ago
- Jupyter Notebooks for the Blue Team☆145Updated last month
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 3 weeks ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆649Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆280Updated 8 months ago
- MISP Playbooks☆197Updated 2 months ago
- ☆120Updated last year
- An open-source self-hosted purple team management web application.☆268Updated 3 weeks ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Atomic Purple Team Framework and Lifecycle☆294Updated 4 years ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆114Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆40Updated last month
- ☆613Updated last year
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆54Updated 5 years ago