Automation tool for Windows Deception Host Burn-In
☆86Dec 4, 2024Updated last year
Alternatives and similar repositories for sinon
Users that are interested in sinon are comparing it to the libraries listed below
Sorting:
- ☆75Mar 19, 2025Updated last year
- Deep Linux runtime visibility meets Wireshark☆305Nov 13, 2025Updated 4 months ago
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- ☆22Aug 29, 2023Updated 2 years ago
- Open Adversarial Exposure Validation Platform☆1,645Updated this week
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 3 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆32Oct 15, 2025Updated 5 months ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆437Mar 9, 2026Updated last week
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- ☆67Mar 5, 2026Updated 2 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆88Dec 20, 2024Updated last year
- Splunk add-on related to the PurpleLab tool☆41Apr 8, 2024Updated last year
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Threat-hunting tool for Linux☆1,045Mar 11, 2026Updated last week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 4 months ago
- Generate test data that is not only realistic but also contextually meaningful☆28Jun 30, 2023Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- ☆11Oct 17, 2020Updated 5 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆414Updated this week
- ☆29May 10, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆132Jan 28, 2025Updated last year
- Aranya user library, daemon, and policy code☆194Mar 12, 2026Updated last week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆252Mar 7, 2022Updated 4 years ago
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month