punk-security / pwnspoofLinks
Pwnspoof repository
☆261Updated last year
Alternatives and similar repositories for pwnspoof
Users that are interested in pwnspoof are comparing it to the libraries listed below
Sorting:
- Repository resource for threat hunter☆158Updated 6 years ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆158Updated 6 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆313Updated 3 weeks ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 11 months ago
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- Tools for simulating threats☆185Updated last year
- ☆160Updated last year
- MISP Playbooks☆201Updated 3 months ago
- Useful resources about phishing email analysis☆85Updated 4 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- An open-source self-hosted purple team management web application.☆271Updated 3 weeks ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆117Updated 2 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆465Updated 10 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆141Updated last month
- Resources To Learn And Understand SIGMA Rules☆175Updated 2 years ago
- Open Threat Hunting Framework☆117Updated 2 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆244Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆652Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆185Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 10 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago