Adversary Emulation Framework
-
Updated
Nov 11, 2024 - Go
Adversary Emulation Framework
PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
XENA is Corss-Platform Software for Cyber-Security Automation, Adversary Simulations, and Red Team Operations. XENA strives to be fully integrated security penetration testing framework. It is equipped with a post-exploitation agent, C2 server, and a dark-themed elegant user interface.
Collection of OPSEC Tradecraft and TTPs for Red Team Operations
Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).
Repo containing cracked red teaming tools.
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.
A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.
Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on
Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop
Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpose of generating attack telemetry in properly monitored Windows enterprise environments
فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
A tool to generate macOS initial access vectors using Prelude Operator payloads
Computer Network Exploitation (CNE) Field Manual
KitsuneC2 is a cross-platform adversary emulation tool written in Go.
Add a description, image, and links to the adversary-simulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-simulation topic, visit your repo's landing page and select "manage topics."