Empire
Attack simulator
A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks.
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
4k stars
103 watching
583 forks
Language: PowerShell
last commit: 2 months ago c2empirehacktoberfestredteam-infrastructure
Related projects:
Repository | Description | Stars |
---|---|---|
| A control layer on top of Amazon EC2 Container Service (ECS) that simplifies deploying and managing container-based microservices architecture | 2,688 |
| Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs | 1,592 |
| An exploitation framework designed to aid in the testing of embedded devices' vulnerabilities | 12,253 |
| Automates reconnaissance and vulnerability scanning of internet targets | 7,343 |
| An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. | 9,005 |
| An open source framework for simulating and testing advanced adversarial tactics and techniques in a controlled environment | 8,676 |
| Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 615 |
| A collaborative, multi-platform red teaming framework with a web-based interface and support for plugins and extensions | 3,324 |
| Provides a collection of plans to test defenses against real-world cyber threats. | 1,737 |
| An open-source API gateway and load balancer for microservices built on Envoy Proxy. | 4,388 |
| A fast and customizable vulnerability scanner built on a YAML-based DSL. | 21,054 |
| Analyzes network traffic to detect command and control communication behaviors. | 2,509 |
| An integrated security monitoring and threat hunting platform that collects, analyzes, and responds to network traffic data | 3,347 |
| A framework for executing and analyzing post-exploitation attacks in a controlled environment | 171 |
| A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,735 |