All-In-One: Purple Teaming Exercises with Open-Source Tools
-
Updated
Mar 13, 2024
All-In-One: Purple Teaming Exercises with Open-Source Tools
The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.
A simple powershell script to execute one liner commands in windows
An REST API client library for Prelude Operator.
An automated Cyber Threat Intelligence (CTI) apparatus, implemented via a suite of Free & Open-source Software (FOSS)
Sliver Extension to monitor target's screen and automatically grab QRCodes displayed during MFA enrollement
A blog about cyber security and life. coming. soonish.
Run tests from the Atomic Red Team framework through Go
opyrator is a REST API client library for Prelude Operator.
The Security Automation Toolkit
Caldera for OT Plugin
A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.
A tool to generate macOS initial access vectors using Prelude Operator payloads
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
AtomicThreatProfile is a Python script that creates custom adversary profiles for use in Caldera using json formatted data from Control Validation Compass
Manticore Adversary Emulation Cli
Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to do this with some level of stealth.
Add a description, image, and links to the adversary-emulation topic page so that developers can more easily learn about it.
To associate your repository with the adversary-emulation topic, visit your repo's landing page and select "manage topics."