Cylabs
search
⌘Ctrlk
Cylabs
  • 😊Welcome to CyLabs
  • 101 Series
  • Introduction to Cyber Security Operations
  • Cyber Security Assessment
  • Cybersecurity Frameworks and Standards
  • Security Domains
    • Security Designing
    • Application Security
    • Cloud Security
    • Identity and Access Management
    • Cloud Security
    • DevSecOps
    • Social Engineering
    • DevOps
    • Mobile Security
    • IOT/OT/SCADA
    • Network Security
    • Wireless Attacks
    • Purple Teaming
      • Tools
    • Kubernetes Security
    • Hardware Security
    • Container Security
    • AI
    • Reverse Engineering
  • Operational Security
  • Industry Specific Security:Case Studies
  • Computational Science
  • Data Engineering
  • AI/ML and Data Science
  • Application Development
  • Radom Topics :)
  • CISSP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Domains

Purple Teaming

adversary emulation

APT groups and TTP's

IMAP-based password-spraying attacks,

thousands of hijacked network devices around the world

LogoGitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.GitHubchevron-right

https://github.com/hunters-forge/mordorarrow-up-right

https://github.com/redcanaryco/atomic-red-teamarrow-up-right

https://github.com/mitre/calderaarrow-up-right

References :

https://www.youtube.com/watch?v=wN9_lcW2raEarrow-up-right

https://www.youtube.com/watch?v=pvGQiNOmMBsarrow-up-right

https://pentestit.com/adversary-emulation-tools-list/arrow-up-right [ Read this resource for more tools]

https://redcanary.com/blog/comparing-red-team-platforms/arrow-up-right

https://blog.qualys.com/vulnerabilities-threat-research/2021/08/05/tenacity-an-adversary-emulation-tool-for-persistencearrow-up-right

Logo9 Cyber Attack Simulation Tools to Improve SecurityGeekflarechevron-right
PreviousKismetchevron-leftNextToolschevron-right

Last updated 1 year ago