tevora-threat / atomic_red_team_gui
Windows GUI/Execution Engine for Atomic Red Team Atomics
☆34Updated 4 years ago
Alternatives and similar repositories for atomic_red_team_gui:
Users that are interested in atomic_red_team_gui are comparing it to the libraries listed below
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 3 months ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 10 months ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Queries for Carbon Black Response☆11Updated 5 years ago
- ☆14Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- ☆26Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- Automate Network sessions enumeration of connected users in the domain, to facilitate AD Reconnaissance for Adversary simulation & Red Te…☆15Updated 4 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆28Updated 5 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 3 years ago
- ☆30Updated 7 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago