tevora-threat / atomic_red_team_gui
Windows GUI/Execution Engine for Atomic Red Team Atomics
☆34Updated 4 years ago
Alternatives and similar repositories for atomic_red_team_gui:
Users that are interested in atomic_red_team_gui are comparing it to the libraries listed below
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 4 months ago
- ☆27Updated 3 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆15Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆16Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Sp00fer blog post -☆26Updated 2 years ago
- ☆32Updated 7 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- ☆56Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Some talks about security☆13Updated 4 years ago
- ☆41Updated last year
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- BloodHound Data Scanner☆45Updated 4 years ago