Stars
Weiss Schwarz Montage Tools (including parsing and exporting)
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Attack and defend active directory using modern post exploitation adversary tradecraft activity
An informational repo about hunting for adversaries in your IT environment.
MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository
Virtual Machine for Adversary Emulation and Threat Hunting
🗣️ Tool to generate adversarial text examples and test machine learning models against them
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Adversary Tactics - PowerShell Training
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
syslog-ng is an enhanced log daemon, supporting a wide range of input and output methods: syslog, unstructured text, queueing, SQL & NoSQL.
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in…
Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detections and correlation rules by Blue teams.
Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
Basics on commands/tools/info on how to assess the security of mobile applications
Toolkit to emulate firmware and analyse it for security vulnerabilities
Execute ELF files without dropping them on disk