cyberstars
cyberstars / target / endpoint

Tools for endpoints

Workstations, servers and EDR-managed devices.

122 tools indexed

MISP

Threat intelligence sharing platform.

AutomateAnalyzeNetworksEndpoints
PHPAGPL-3.0

Automated adversary emulation.

AutomateExploitEndpointsNetworks
PythonApache-2.0

Microsoft Threat Intelligence in Python.

AnalyzeAutomateCloudEndpoints
PythonMIT

Memory forensics as a filesystem.

AnalyzeEndpointsBinaries
CAGPL-3.0

Exploit development and delivery platform.

ExploitAutomateNetworksEndpoints
RubyBSD-3-Clause

Multi-platform C2 framework.

AutomateExploitEndpoints
GoBSD-3-Clause

Nmap

The classic network mapper and port scanner.

ScanReconNetworksEndpoints
CNPSL

Modular C2 framework.

ExploitAutomateEndpoints
JavaScriptMIT

Anonymous file share + chat over Tor.

HardenInterceptNetworksEndpoints
PythonGPL-3.0

Open adversarial exposure validation.

AutomateMonitorEndpointsNetworks
JavaMIT

Open cyber threat intelligence platform.

AnalyzeAutomateNetworksEndpoints
TypeScriptApache-2.0

Decentralized, modular honeypot.

MonitorNetworksEndpoints
PythonBSD-3-Clause

Direct Memory Access attack toolkit.

ExploitInterceptEndpointsBinaries
CGPL-3.0

PTF

Pentest Testers Framework installer.

AutomateEndpoints
PythonBSD-3-Clause

Super-timelining for forensics.

AnalyzeEndpointsBinaries
PythonApache-2.0

Live PowerShell disk forensics.

AnalyzeEndpoints
C#MIT

PowerShell post-exploitation framework.

ExploitReconActive DirectoryEndpoints
PowerShellBSD-3-Clause

PowerShell AD post-exploitation.

ExploitReconActive DirectoryEndpoints
PowerShellMIT

Endgame's ATT&CK simulation framework.

AutomateExploitEndpoints
PythonCustom

Abuse Exchange services from the outside.

ExploitInterceptActive DirectoryEndpoints
GoCustom

Asynchronous C2 powered by DLR runtimes.

ExploitAutomateEndpointsActive Directory
PythonGPL-3.0

Find and exploit sudo misconfigurations.

ExploitReconEndpoints
ShellGPL-3.0