Small and highly portable detection tests based on MITRE's ATT&CK.
☆12Feb 11, 2020Updated 6 years ago
Alternatives and similar repositories for atomic-red-team
Users that are interested in atomic-red-team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 4, 2024Updated 2 years ago
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- ☆16May 20, 2022Updated 3 years ago
- Create a list of possible usernames for bruteforcing☆82Feb 18, 2024Updated 2 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- EDHOC (RFC 9528): Lightweight authenticated key exchange in C for IoT and constrained devices☆14Mar 23, 2026Updated last month
- 3rd Person RPG project with Unreal Engine 4.21.2☆11Nov 14, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- An implementation of Brakerski et al's "Fully homomorphic encryption without bootstrapping"☆11Apr 29, 2013Updated 13 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- Курс по анализу данных онлайн-магистратуры МФТИ осень 2021☆10Dec 7, 2022Updated 3 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- This small book offers a deep-dive introduction on cryptography.☆17Oct 16, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- NeuralinkLLM is an open-source project dedicated to creating a robust interface for interacting and connecting your Brain via NeuralinkGP…☆12Sep 28, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- Dump Windows registry hives as text.☆17Feb 9, 2019Updated 7 years ago
- In the spirit of #opendata, we publish our list (dangerous.domains) and a full change history here on GitHub, delayed by 6 hours. For liv…☆14Apr 19, 2025Updated last year
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆24Mar 31, 2024Updated 2 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆12Apr 13, 2018Updated 8 years ago
- ☆13May 27, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- The online version of Ciphey☆18Oct 11, 2023Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆28Apr 15, 2025Updated last year
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year