manintheboxz's Stars
mitre/atomic
A MITRE Caldera plugin
center-for-threat-informed-defense/caldera_pathfinder
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
msdirtbag/MicrosoftPurpleTeamToolkit
cisagov/decider
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
arttoolkit/arttoolkit.github.io
A RedTeam Toolkit
redhuntlabs/Awesome-Asset-Discovery
List of Awesome Asset Discovery Resources
blackhillsinfosec/play.backdoorsandbreaches.com
Dashboard for conducting Backdoors and Breaches sessions over Zoom.
PlumHound/PlumHound
Bloodhound Reporting for Blue and Purple Teams
ForceFledgling/proxyhub
An advanced [Finder | Checker | Server] tool for proxy servers, supporting both HTTP(S) and SOCKS protocols. 🎭
RedSiege/GraphStrike
Cobalt Strike HTTPS beaconing over Microsoft Graph API
lkarlslund/Adalanche
Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)
iknowjason/AutomatedEmulation
An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.
ine-labs/ThreatSeeker
ThreatSeeker: Threat Hunting via Windows Event Logs
hausec/ADAPE-Script
Active Directory Assessment and Privilege Escalation Script
danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
undergroundwires/privacy.sexy
Open-source tool to enforce privacy & security best-practices on Windows, macOS and Linux, because privacy is sexy
Greenwolf/ntlm_theft
A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)
rowham/WinSigmaRuleAnalyzer
Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of the windows rules landscape.
YARAHQ/yara-forge
Automated YARA Rule Standardization and Quality Assurance Tool
mattnotmax/cyberchef-recipes
A list of cyber-chef recipes and curated links
cammurray/orca
The Microsoft Defender for Office 365 Recommended Configuration Analyzer (ORCA)
vm32/Digital-Forensics-Script-for-Linux
Advanced Bash script designed for conducting digital forensics on Linux systems
tsale/EDR-Telemetry
This project aims to compare and evaluate the telemetry of various EDR products.
microsoft/ML-For-Beginners
12 weeks, 26 lessons, 52 quizzes, classic Machine Learning for all
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
ph4nt0mbyt3/Darkside
C# AV/EDR Killer using less-known driver (BYOVD)
Leo4j/Amnesiac
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
CasperGN/ActiveDirectoryEnumeration
Enumerate AD through LDAP with a collection of helpfull scripts being bundled
daverstephens/The-SOC-Shop
Repository of scripts/tools that may be useful in Security Operations Centres (SOC)
maysarax/SOC