Cylabs
search
Ctrlk
  • 😊Welcome to CyLabs
  • 101 Serieschevron-right
  • Introduction to Cyber Security Operationschevron-right
  • Cyber Security Assessmentchevron-right
  • Cybersecurity Frameworks and Standardschevron-right
  • Security Domainschevron-right
    • Security Designing
    • Application Securitychevron-right
    • Cloud Securitychevron-right
    • Identity and Access Management
    • Cloud Securitychevron-right
    • DevSecOpschevron-right
    • Social Engineeringchevron-right
    • DevOpschevron-right
    • Mobile Securitychevron-right
    • IOT/OT/SCADAchevron-right
    • Network Securitychevron-right
    • Wireless Attackschevron-right
    • Purple Teamingchevron-right
      • Toolschevron-right
    • Kubernetes Securitychevron-right
    • Hardware Security
    • Container Securitychevron-right
    • AIchevron-right
    • Reverse Engineeringchevron-right
  • Operational Securitychevron-right
  • Industry Specific Security:Case Studieschevron-right
  • Computational Sciencechevron-right
  • Data Engineering
  • AI/ML and Data Sciencechevron-right
  • Application Developmentchevron-right
  • Radom Topics :)chevron-right
  • CISSP
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Security Domains

Purple Teaming

adversary emulation

APT groups and TTP's

IMAP-based password-spraying attacks,

thousands of hijacked network devices around the world

LogoGitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.GitHubchevron-right

https://github.com/hunters-forge/mordorarrow-up-right

https://github.com/redcanaryco/atomic-red-teamarrow-up-right

https://github.com/mitre/calderaarrow-up-right

References :

https://www.youtube.com/watch?v=wN9_lcW2raEarrow-up-right

https://www.youtube.com/watch?v=pvGQiNOmMBsarrow-up-right

https://pentestit.com/adversary-emulation-tools-list/arrow-up-right [ Read this resource for more tools]

https://redcanary.com/blog/comparing-red-team-platforms/arrow-up-right

https://blog.qualys.com/vulnerabilities-threat-research/2021/08/05/tenacity-an-adversary-emulation-tool-for-persistencearrow-up-right

Logo9 Cyber Attack Simulation Tools to Improve SecurityGeekflarechevron-right
PreviousKismetchevron-leftNextToolschevron-right

Last updated 1 year ago

Was this helpful?

Was this helpful?