Cylabs
Ctrlk
  • 😊Welcome to CyLabs
  • 101 Series
  • Introduction to Cyber Security Operations
  • Cyber Security Assessment
  • Cybersecurity Frameworks and Standards
  • Security Domains
    • Security Designing
    • Application Security
    • Cloud Security
    • Identity and Access Management
    • Cloud Security
    • DevSecOps
    • Social Engineering
    • DevOps
    • Mobile Security
    • IOT/OT/SCADA
    • Network Security
    • Wireless Attacks
    • Purple Teaming
      • Tools
    • Kubernetes Security
    • Hardware Security
    • Container Security
    • AI
    • Reverse Engineering
  • Operational Security
  • Industry Specific Security:Case Studies
  • Computational Science
  • Data Engineering
  • AI/ML and Data Science
  • Application Development
  • Radom Topics :)
  • CISSP
Powered by GitBook
On this page

Was this helpful?

  1. Security Domains

Purple Teaming

adversary emulation

APT groups and TTP's

IMAP-based password-spraying attacks,

thousands of hijacked network devices around the world

LogoGitHub - drk1wi/Modlishka: Modlishka. Reverse Proxy.GitHub

https://github.com/hunters-forge/mordor

https://github.com/redcanaryco/atomic-red-team

https://github.com/mitre/caldera

References :

https://www.youtube.com/watch?v=wN9_lcW2raE

https://www.youtube.com/watch?v=pvGQiNOmMBs

https://pentestit.com/adversary-emulation-tools-list/ [ Read this resource for more tools]

https://redcanary.com/blog/comparing-red-team-platforms/

https://blog.qualys.com/vulnerabilities-threat-research/2021/08/05/tenacity-an-adversary-emulation-tool-for-persistence

Logo9 Cyber Attack Simulation Tools to Improve SecurityGeekflare
PreviousKismetNextTools

Last updated 1 year ago

Was this helpful?