 |
sulley |
A pure-python fully automated and unattended fuzzing framework. |
|
|
 |
boofuzz |
Network protocol fuzzing for humans. |
|
|
 |
RedEye |
RedEye is a visual analytic tool supporting Red & Blue Team operations. |
|
|
 |
ThreatMapper |
Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more. |
|
|
|
|
 |
atomic-red-team |
Small and highly portable detection tests based on MITRE's ATT&CK. |
|
|
 |
MITRE ATT&CK |
Knowledge base of adversary tactics and techniques based on real-world observations. |
|
|
 |
kerbrute |
Bruteforce and enumerate Active Directory accounts through Kerberos pre-authentication. |
|
|
 |
RedELK |
Tool for Red Teams used for tracking and alarming about Blue Team activities. |
|
|
|
|