ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of scripts, lived as a rolling virtual machine, existed as code to build a Linux ISO, and has now been converted to a set of ansible playbooks. Why Ansible? Why not? This seemed a natural evolution.
☆76Nov 19, 2024Updated last year
Alternatives and similar repositories for threatbox
Users that are interested in threatbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Event Data Collector☆39Jan 12, 2026Updated 2 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Windows NTLM Authentication Backdoor☆241Jan 15, 2025Updated last year
- ☆12Oct 9, 2022Updated 3 years ago
- Disposable and resilient red team infrastructure with Terraform☆278Feb 1, 2019Updated 7 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Apr 18, 2024Updated last year
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆231Jun 17, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Hackers Cookbook - Tons of hacker cli recipes ready to search and use when you need them☆42Mar 12, 2026Updated 2 weeks ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Jul 6, 2024Updated last year
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated last month
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- A PowerShell armoury for security guys and girls☆467Jan 23, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- ☆35Jan 22, 2025Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆124Mar 18, 2023Updated 3 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 6 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago