Attack Range to test detection against nativel serverless cloud services and environments
☆35Sep 8, 2021Updated 4 years ago
Alternatives and similar repositories for attack_range_cloud
Users that are interested in attack_range_cloud are comparing it to the libraries listed below
Sorting:
- Build a attack range in your local machine☆132May 8, 2023Updated 2 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- ☆18Dec 6, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Splunk Enterprise on AWS - QuickStart☆14Oct 9, 2022Updated 3 years ago
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated 2 weeks ago
- ☆34Apr 29, 2021Updated 4 years ago
- Dead simple C# project to take a screenshot.☆19Jan 14, 2019Updated 7 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,445Updated this week
- ☆15Jul 20, 2022Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- ☆19Jan 27, 2022Updated 4 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Jul 6, 2023Updated 2 years ago
- A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-pur…☆627Mar 21, 2025Updated 11 months ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Various blog post projects.☆25Nov 21, 2025Updated 3 months ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- ☆25Nov 18, 2016Updated 9 years ago
- Simple parser to get useful information from AWS S3 logs☆27Sep 5, 2021Updated 4 years ago
- Checkpot Honeypot Checker☆27Aug 13, 2018Updated 7 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- ☆30Nov 15, 2018Updated 7 years ago
- ☆29Nov 13, 2020Updated 5 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆33Jul 7, 2016Updated 9 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- Recon Hunt Queries☆79May 16, 2021Updated 4 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 4 years ago