Skip to content
#

impersonation

Here are 43 public repositories matching this topic...

a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations and privilege escalations attacks, replicate the tactics and techniques of an advanced adversary in a network.

  • Updated Mar 27, 2022
  • Pascal

Improve this page

Add a description, image, and links to the impersonation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the impersonation topic, visit your repo's landing page and select "manage topics."

Learn more