Pentest Lab
Local pentest lab using docker compose to spin up victim and attacker services.
RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK. RTA is composed of python scripts that generate evidence of over 50 different ATT&CK tactics, as well as a compiled binary application that performs activities such as file timestopping, process injections, and beacon simulation as needed. Where possible, RTA attempts to perform the actual malicious activity described. In other cases, the RTAs will emulate all or parts of the activity. For example, some lateral movement will by default target local host (though with parameters typically allow for multi-host testing). In other cases, executables such as cmd.exe or python.exe will be renamed to make it appear as if a Windows binary is doing non-standard activities. Installation Prerequisites: Python2.7 Installation Steps: Download a copy of the RTA repo from https://github.com/endgameinc/RTA. Extract the contents of the zip archive into an RTA folder, such as c:\RTA. For the full experience, download additional files into the bin subdirectory (as described in the dependencies section below). Dependencies:
Local pentest lab using docker compose to spin up victim and attacker services.
A simple SSRF-testing sheriff written in Go
CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.
Online Telegram bot for collecting information on individuals from various websites.
A collection of tips and tricks for container and container orchestration hacking
Collection of URLs for vulnerable web applications and systems for cybersecurity practice.