Small and highly portable detection tests based on MITRE's ATT&CK.
☆10Feb 11, 2020Updated 6 years ago
Alternatives and similar repositories for atomic-red-team
Users that are interested in atomic-red-team are comparing it to the libraries listed below
Sorting:
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- ☆16May 20, 2022Updated 3 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- 3rd Person RPG project with Unreal Engine 4.21.2☆11Nov 14, 2022Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Some scripts and reports to expand your dbachecks experience☆12Mar 13, 2023Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- NeuralinkLLM is an open-source project dedicated to creating a robust interface for interacting and connecting your Brain via NeuralinkGP…☆12Sep 28, 2024Updated last year
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Dump Windows registry hives as text.☆17Feb 9, 2019Updated 7 years ago
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated 11 months ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆24Mar 31, 2024Updated last year
- ☆11Dec 26, 2022Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated 11 months ago
- ☆13May 27, 2020Updated 5 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆26Jan 27, 2022Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- ☆214Feb 10, 2026Updated last month
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Implementation of methodology described in ACM SIGCOMM CCR 48(1), pp. 19-27.☆14May 15, 2018Updated 7 years ago
- ☆21Sep 5, 2016Updated 9 years ago
- PQCrypto is a go post quantum cryptography (PQC) algorithms lib for studying the pqc migration and application adaptation.☆15Nov 14, 2022Updated 3 years ago
- This version of VLC is suitable with ns3 version 3.25. Please dont use an older version than the specified one.☆10Apr 3, 2017Updated 8 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- ☆12Aug 25, 2023Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- ☆14Sep 19, 2019Updated 6 years ago