Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for purpleteam
purpleteam
x
60 search results found
Lolbas
⭐
6,294
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Hacktools
⭐
5,367
The all-in-one browser extension for offensive security professionals 🛠
Ultimateapplockerbypasslist
⭐
1,801
The goal of this repository is to document the most common techniques to bypass AppLocker.
Lolbas
⭐
1,572
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
Stratus Red Team
⭐
1,539
☁️ ⚡ Granular, Actionable Adversary Emulation for the Cloud
Apt Hunter
⭐
1,045
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Cyber Security
⭐
1,000
My cyber security tools
Plumhound
⭐
958
Bloodhound for Blue and Purple Teams
Awesome Soc
⭐
906
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Purplesharp
⭐
672
PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monitored Windows environments
Community Threats
⭐
649
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
Kubehound
⭐
552
Kubernetes Attack Graph
Enterprisepurpleteaming
⭐
493
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Purplecloud
⭐
461
A little tool to play with Azure Identity - Azure Active Directory lab creation tool
Falconfriday
⭐
451
Hunting queries and detections
Aws Cloudsaga
⭐
406
AWS CloudSaga - Simulate security events in AWS
Purple Team Exercise Framework
⭐
366
Purple Team Exercise Framework
Goodhound
⭐
255
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Slack Watchman
⭐
252
Slack enumeration and exposed secrets detection tool
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Pwf
⭐
224
Practical Windows Forensics Training
Diablo
⭐
189
Diablo ~ Hacking / Pentesting & Reporting
Gitlab Watchman
⭐
174
Finding exposed secrets and personal data in GitLab
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Atomicpurpleteam
⭐
143
Atomic Purple Team Framework and Lifecycle
Awesome Lists
⭐
124
Security lists for SOC detections
Edr Test
⭐
124
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
Shonydanza
⭐
110
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Purpleteam
⭐
108
CLI component of OWASP PurpleTeam
Purpleteam
⭐
106
Purpleteam scripts simulation & Detection - trigger events for SOC detections
Murmurhash
⭐
101
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Apt Lab Terraform
⭐
97
Purple Teaming Attack & Hunt Lab - Terraform
Ezemu
⭐
93
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Nist To Tech
⭐
88
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Recon365
⭐
77
Gather information from an email address connected to Office 365
Bluecloud
⭐
74
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
Ad Privileged Audit
⭐
71
Provides various Windows Server Active Directory (AD) security-focused reports.
Pylirt
⭐
52
Pylirt - Python Linux Incident Response Toolkit
Purplespray
⭐
47
PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpose of generating attack telemetry in properly monitored Windows enterprise environments
Crlj
⭐
39
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
Aws Attack
⭐
32
AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, Pacu.
Adversarial Threat Modelling
⭐
31
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Cyber Threat Profiling
⭐
28
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense
Github Watchman
⭐
26
Monitoring GitHub for sensitive data shared publicly
Awesome Linux Attack Forensics Purplelabs
⭐
23
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
Kh
⭐
13
Keyhack - Golang API token/webhook validator
Pooroperationalsecuritypractices
⭐
12
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
Psget Domain Mailinfo
⭐
12
PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.
Useragent Fuzz Lib
⭐
12
User-agent Fuzzing Library. This repository holds data of all the user agents in the `user_agents.json` file, which can be used directly with any tool that can parse json format.
Cybersecurity References
⭐
11
A collection of cheat sheets and power commands.
Purpleteam App Scanner
⭐
10
Application scanning component of OWASP PurpleTeam
Slack Watchman Enterprise Grid
⭐
8
Monitoring your Slack Enterprise Grid for sensitive information
Purpleteam Tls Scanner
⭐
8
TLS scanning component of OWASP PurpleTeam
Ishelly
⭐
8
A tool to generate macOS initial access vectors using Prelude Operator payloads
Purple Team Resources
⭐
8
A curated list of tools and resources that I use daily as a Purple-Team operator.
Payloadkit
⭐
7
An offensive security framework for writing payloads
Detectionnavigator
⭐
6
Anyteam
⭐
6
AnyTeam - Red Team | Purple Team | Blue Team
1-60 of 60 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.