Atomic-Red-Team-C2
Attack simulator
A framework for executing and analyzing post-exploitation attacks in a controlled environment
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
171 stars
7 watching
22 forks
Language: Python
last commit: 3 months ago csharpdotnetmitre-attackoffensive-securitypost-exploitationpowershell-scriptspurple-teampurpleteampython3red-teamsredteam
Related projects:
Repository | Description | Stars |
---|---|---|
redcanaryco/atomic-red-team | A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,811 |
martabyte/red-team-ops | A collection of tools and techniques for simulating cyber attacks on computer systems | 19 |
nshalabi/attack-tools | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,012 |
redcanaryco/chain-reactor | Tools for simulating adversary behaviors on Linux endpoints | 292 |
nettitude/poshc2 | A C2 framework used to aid red teamers with post-exploitation and lateral movement | 1,820 |
sbasu7241/aws-threat-simulation-and-detection | This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 282 |
deimosc2/deimosc2 | A post-exploitation command and control framework that supports multiple communication methods and interacts with compromised machines | 1,096 |
uber-common/metta | An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,102 |
n0dec/malwless | A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
enkomio/alanframework | A post-exploitation framework that enables red-team activities by providing a set of tools for infiltrating and controlling systems remotely. | 462 |
infosecn1nja/red-teaming-toolkit | A collection of tools to simulate an adversary's actions and test security controls | 9,116 |
mhaskar/octopus | An open-source pre-operation C2 server that enables stealthy control and information gathering before a red team operation. | 730 |
trycatchhcf/dumpsterfire | A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 997 |
a-poc/redteam-tools | A collection of tools and resources for simulating a red teaming attack on computer systems. | 6,033 |
drb-ra/c2intelfeeds | Automatically generated C2 feed data from Censys search results | 531 |