Empire
Attack simulator
A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks.
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
4k stars
103 watching
583 forks
Language: PowerShell
last commit: 3 days ago c2empirehacktoberfestredteam-infrastructure
Related projects:
Repository | Description | Stars |
---|---|---|
remind101/empire | A control layer on top of Amazon EC2 Container Service (ECS) that simplifies deploying and managing container-based microservices architecture | 2,688 |
byt3bl33d3r/deathstar | Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs | 1,592 |
threat9/routersploit | An exploitation framework designed to aid in the testing of embedded devices' vulnerabilities | 12,253 |
blacklanternsecurity/bbot | Automates reconnaissance and vulnerability scanning of internet targets | 7,343 |
malwaredllc/byob | An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. | 9,005 |
bishopfox/sliver | An open source framework for simulating and testing advanced adversarial tactics and techniques in a controlled environment | 8,676 |
qsecure-labs/overlord | Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. | 615 |
its-a-feature/mythic | A collaborative, multi-platform red teaming framework with a web-based interface and support for plugins and extensions | 3,324 |
center-for-threat-informed-defense/adversary_emulation_library | Provides a collection of plans to test defenses against real-world cyber threats. | 1,737 |
emissary-ingress/emissary | An open-source API gateway and load balancer for microservices built on Envoy Proxy. | 4,388 |
projectdiscovery/nuclei | A fast and customizable vulnerability scanner built on a YAML-based DSL. | 21,054 |
activecm/rita-legacy | Analyzes network traffic to detect command and control communication behaviors. | 2,509 |
security-onion-solutions/securityonion | An integrated security monitoring and threat hunting platform that collects, analyzes, and responds to network traffic data | 3,330 |
darmado/atomic-red-team-c2 | A framework for executing and analyzing post-exploitation attacks in a controlled environment | 171 |
liamg/traitor | A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,735 |