Open Breach and Attack Simulation Platform
-
Updated
May 27, 2024 - Java
Open Breach and Attack Simulation Platform
A cybersecurity resource library of knowledge documents, links to tools, and automation scripts.
Kubernetes Attack Graph
AWS CloudSaga - Simulate security events in AWS
M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Monitoring Stack Overflow Enterprise for exposed secrets
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
All-In-One: Purple Teaming Exercises with Open-Source Tools
CuteRAT is a stealthy remote access tool without any dependencies
PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
Slack enumeration and exposed secrets detection tool
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
Finding exposed secrets and personal data in GitLab
Monitoring your Slack Enterprise Grid for sensitive information
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Learning diffierent Python Scripts to use in different synarios we come across while performing pentest or Purple Teaming.
AnyTeam - Red Team | Purple Team | Blue Team
Add a description, image, and links to the purple-team topic page so that developers can more easily learn about it.
To associate your repository with the purple-team topic, visit your repo's landing page and select "manage topics."