Lists (32)
Sort Name ascending (A-Z)
ADVERSARY LANGUAGES
Alternative programming languages used by adversaries5 repositories
AI
27 repositories
APP
127 repositories
C2:Loaders
4 repositories
CHEAT SHEETS
20 repositories
COLLECTION
6 repositories
COMMAND & CONTROL
List of C2 projects we've used at least once during assumed breach, threat emulation, and purple team exercise work.56 repositories
CREDENTIAL ACCESS
44 repositories
CTI ANALYSIS
Tools for automating CTI analysis42 repositories
DEFENSE EVASION
111 repositories
DEVSEC OPS
All things DevSecOps38 repositories
DISCOVERY
48 repositories
EXECUTION
8 repositories
EXFILTRATION
4 repositories
INITIAL ACCESS
17 repositories
LATERAL MOVEMENT
11 repositories
LEARNING
2 repositories
MacOS
22 repositories
MALDOC
8 repositories
MOBILE
1 repository
OSINT
7 repositories
PERSISTENCE
12 repositories
PIPELINES
2 repositories
PRIVILEGE ESCALATION
37 repositories
RANSOMWARE SIM
5 repositories
RECON
26 repositories
REPORTING
2 repositories
SMART CONTRACT TOOLS
6 repositories
TOOLS
This list includes offensive operations tooling that includes many TTPs50 repositories
TTP
3 repositories
VULN ANALYSIS
4 repositories
WEB APPS
Open source web apps1 repository
Stars
0
results
for forked starred repositories
written in HTML
Clear filter