Small and highly portable detection tests based on MITRE's ATT&CK.
☆10Feb 11, 2020Updated 6 years ago
Alternatives and similar repositories for atomic-red-team
Users that are interested in atomic-red-team are comparing it to the libraries listed below
Sorting:
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- ☆23Jan 1, 2026Updated 2 months ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 12 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- PowerShell scripts for dealing with Maintenance Plans.☆12Dec 12, 2018Updated 7 years ago
- NeuralinkLLM is an open-source project dedicated to creating a robust interface for interacting and connecting your Brain via NeuralinkGP…☆12Sep 28, 2024Updated last year
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆14Jan 6, 2026Updated last month
- ☆12Aug 25, 2023Updated 2 years ago
- This version of VLC is suitable with ns3 version 3.25. Please dont use an older version than the specified one.☆10Apr 3, 2017Updated 8 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- ☆12Apr 13, 2018Updated 7 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- Dump Windows registry hives as text.☆17Feb 9, 2019Updated 7 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- Каталог нетсталкерских ресурсов, команд, инструментов, источников контента.☆11Nov 16, 2020Updated 5 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- ☆13Sep 8, 2024Updated last year
- 3rd Person RPG project with Unreal Engine 4.21.2☆11Nov 14, 2022Updated 3 years ago
- PoC that downloads an executable from public DNS servers☆20Jul 19, 2025Updated 7 months ago
- Build real-time multimodal AI applications 🤖🎙️📹☆11Oct 3, 2024Updated last year
- Implementation of methodology described in ACM SIGCOMM CCR 48(1), pp. 19-27.☆14May 15, 2018Updated 7 years ago
- ☆11Nov 8, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- ☆15Feb 27, 2019Updated 7 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- OS Command Injection Vulnerability Payload List☆57Feb 23, 2021Updated 5 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- ☆21Mar 27, 2025Updated 11 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- This small book offers a deep-dive introduction on cryptography.☆16Oct 16, 2023Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- Call API from Zspoof is a tool which is used for spoofing calls. This tool lets you to call anyone by changing callerid.☆17Sep 10, 2023Updated 2 years ago
- ☆16May 20, 2022Updated 3 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago