tevora-threat / atomic_red_team_guiLinks
Windows GUI/Execution Engine for Atomic Red Team Atomics
☆35Updated 5 years ago
Alternatives and similar repositories for atomic_red_team_gui
Users that are interested in atomic_red_team_gui are comparing it to the libraries listed below
Sorting:
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 6 months ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- ☆27Updated 4 years ago
- C# User Simulation☆32Updated 2 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- ☆14Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆16Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Threat Mitigation Strategies☆25Updated last year
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆15Updated 4 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Pwnage☆16Updated 4 months ago