MalwLess
Attack simulator
A tool designed to simulate system compromise or attack behaviors without running processes or PoCs.
Test Blue Team detections without running any attack.
271 stars
29 watching
58 forks
Language: C#
last commit: over 1 year ago blueteamdfirhacktoberfestmitre-attackpowershellredteamsiemsysmon
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An adversary simulation tool for Windows environments to generate attack telemetry and improve detection capabilities. | 782 |
| | A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,011 |
| | An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,103 |
| | A portable set of tests mapped to the MITRE ATT&CK framework for evaluating security environments. | 9,951 |
| | A toolkit for simulating and testing ransomware operations in a controlled environment | 68 |
| | A comprehensive cyber adversary simulation platform for planning and conducting simulated attacks and exercises | 765 |
| | A toolkit for simulating phishing attacks on Office 365 accounts | 1,043 |
| | This repository documents the simulation and detection of various AWS attack scenarios using Stratus Red Team and SumoLogic for logging and analysis. | 284 |
| | An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
| | A toolset for creating and automating customized security events to simulate realistic scenarios for testing and training | 998 |
| | A tool to simulate attacks against virtual environments and collect data into Splunk for detection development | 2,181 |
| | Automates testing of cybersecurity detection and response capabilities in a controlled network environment | 202 |
| | Contains publicly released information on simulated full-spectrum attacks on file systems and security protocols. | 607 |
| | A standardized framework for evaluating and improving the robustness of large language models against adversarial attacks | 366 |