Empire
Attack simulator
A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks.
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
4k stars
103 watching
580 forks
Language: PowerShell
last commit: 11 days ago c2empirehacktoberfestredteam-infrastructure
Related projects:
Repository | Description | Stars |
---|---|---|
remind101/empire | A control layer on top of Amazon EC2 Container Service (ECS) that simplifies deploying and managing container-based microservices architecture | 2,688 |
byt3bl33d3r/deathstar | Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs | 1,585 |
threat9/routersploit | An exploitation framework designed to aid in the testing of embedded devices' vulnerabilities | 12,208 |
blacklanternsecurity/bbot | A multipurpose scanner built to automate reconnaissance, bug bounty, and assembly security testing | 5,289 |
malwaredllc/byob | An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. | 8,989 |
bishopfox/sliver | An open source framework for simulating and testing advanced adversarial tactics and techniques in a controlled environment | 8,536 |
qsecure-labs/overlord | Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 612 |
its-a-feature/mythic | A collaborative, multi-platform red teaming framework with a web-based interface and support for plugins and extensions | 3,263 |
center-for-threat-informed-defense/adversary_emulation_library | Provides a collection of plans to test defenses against real-world cyber threats. | 1,726 |
emissary-ingress/emissary | An open-source API gateway and load balancer for microservices built on Envoy Proxy. | 4,376 |
projectdiscovery/nuclei | A vulnerability scanner built on YAML templates to identify weaknesses in applications and networks. | 20,687 |
activecm/rita-legacy | Analyzes network traffic to detect command and control communication behaviors. | 2,509 |
security-onion-solutions/securityonion | An integrated security monitoring and threat hunting platform that collects, analyzes, and responds to network traffic data | 3,293 |
darmado/atomic-red-team-c2 | A framework for executing and analyzing post-exploitation attacks in a controlled environment | 171 |
liamg/traitor | A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,689 |