redcanaryco / ansible-atomic-red-teamView external linksLinks
This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam
☆27Jul 4, 2024Updated last year
Alternatives and similar repositories for ansible-atomic-red-team
Users that are interested in ansible-atomic-red-team are comparing it to the libraries listed below
Sorting:
- yaa - yaml search for humans☆12Dec 8, 2025Updated 2 months ago
- ☆20Mar 21, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 2 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- ☆11May 13, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- AutoPoC Generator HoneyPoC☆36Dec 7, 2025Updated 2 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 3 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 weeks ago
- ☆12Jul 15, 2022Updated 3 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 6 months ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Authenticode for PNG files☆11Jun 8, 2020Updated 5 years ago
- Extract the Procedures (TTP) from CTI reports☆16Dec 13, 2025Updated 2 months ago
- Multi Vagrant environment with Active Directory☆14Jun 29, 2018Updated 7 years ago
- Signing Visual Basic Macros in Office Files☆14Oct 25, 2020Updated 5 years ago
- ☆57Aug 28, 2023Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 8 months ago
- ☆38Jan 7, 2025Updated last year
- Rust implementation of the Process Herpaderping☆25Jul 6, 2023Updated 2 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 3 months ago
- ☆16Feb 10, 2020Updated 6 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Mar 10, 2023Updated 2 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago