Lists (32)
Sort Name ascending (A-Z)
ADVERSARY LANGUAGES
Alternative programming languages used by adversariesAI
APP
C2:Loaders
CHEAT SHEETS
COLLECTION
COMMAND & CONTROL
List of C2 projects we've used at least once during assumed breach, threat emulation, and purple team exercise work.CREDENTIAL ACCESS
CTI ANALYSIS
Tools for automating CTI analysisDEFENSE EVASION
DEVSEC OPS
All things DevSecOpsDISCOVERY
EXECUTION
EXFILTRATION
INITIAL ACCESS
LATERAL MOVEMENT
LEARNING
MacOS
MALDOC
MOBILE
OSINT
PERSISTENCE
PIPELINES
PRIVILEGE ESCALATION
RANSOMWARE SIM
RECON
REPORTING
SMART CONTRACT TOOLS
TOOLS
This list includes offensive operations tooling that includes many TTPsTTP
VULN ANALYSIS
WEB APPS
Open source web appsStars
Privacy and security baseline for personal Windows 10 and Windows 11
Documentation and supporting script sample for Windows Exploit Guard
Scripts for performing and detecting parent PID spoofing
Weaponizing for privileged file writes bugs with PrintNotify Service
A bunch of useful SSH tools for powershell
Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity
A collection of ARM-based detections for Azure/AzureAD based TTPs
PowerShell module containing commands to easily interact with the Cybereason API.
.Net Assembly loader for the GMSAPasswordReader
PowerShell script to find NTDLL functions that may be hooked by AV or EDR by comparing what exists on disk with the loaded ntdll module.
tanc7 / ProtectMyTooling
Forked from mgeeky/ProtectMyToolingMulti-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it wi…