288 skills found · Page 1 of 10
BishopFox / SliverAdversary Emulation Framework
guardicore / MonkeyInfection Monkey - An open-source adversary emulation platform
mitre / CalderaAutomated Adversary Emulation Platform
FunnyWolf / ViperAdversary simulation and Red teaming platform with AI
infosecn1nja / AD Attack DefenseAttack and defend active directory using modern post exploitation adversary tradecraft activity
OTRF / ThreatHunter PlaybookA community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
cbeuw / CloakA censorship circumvention tool to evade detection by authoritarian state adversaries
splunk / Attack RangeA tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
rabbitstack / FibratusAdversary tradecraft detection, protection, and hunting
DataDog / Stratus Red Team:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud
center-for-threat-informed-defense / Adversary Emulation LibraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
ThreatHuntingProject / ThreatHuntingAn informational repo about hunting for adversaries in your IT environment.
SpecterOps / At PsAdversary Tactics - PowerShell Training
redhuntlabs / RedHunt OSVirtual Machine for Adversary Emulation and Threat Hunting
RoyalVane / CLAN( TPAMI2022 / CVPR2019 Oral ) Taking A Closer Look at Domain Shift: Category-level Adversaries for Semantics Consistent Domain Adaptation
cisagov / DeciderA web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
S3N4T0R-0X0 / APTs Adversary SimulationThis repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and other malicious artifacts that mirror those used in real world attacks .
mdsecactivebreach / CACTUSTORCHCACTUSTORCH: Payload Generation for Adversary Simulations
mvelazc0 / PurpleSharpPurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
lightspin-tech / Red KubeRed Team K8S Adversary Emulation Based on kubectl