Automation tool for Windows Deception Host Burn-In
☆86Dec 4, 2024Updated last year
Alternatives and similar repositories for sinon
Users that are interested in sinon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆75Mar 19, 2025Updated last year
- PII detection platform, leveraging human-in-the-loop AI☆54Nov 29, 2024Updated last year
- ☆22Aug 29, 2023Updated 2 years ago
- Open Adversarial Exposure Validation Platform☆1,655Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆34Oct 15, 2025Updated 5 months ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆440Updated this week
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated last year
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆88Dec 20, 2024Updated last year
- ☆82Mar 5, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 7 years ago
- Threat-hunting tool for Linux☆1,050Updated this week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆19Mar 3, 2022Updated 4 years ago
- Examine Chrome extensions for security issues☆97Nov 16, 2025Updated 4 months ago
- Generate test data that is not only realistic but also contextually meaningful☆28Jun 30, 2023Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆74Jun 21, 2024Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 4 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆416Mar 26, 2026Updated 2 weeks ago
- ☆29May 10, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- Aranya user library, daemon, and policy code☆194Apr 2, 2026Updated last week
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆133Jan 28, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆206Nov 23, 2025Updated 4 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Validate the isolation posture of your container environment.☆314Feb 11, 2026Updated last month
- secator - the pentester's swiss knife☆1,259Apr 3, 2026Updated last week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago