Active C&C Detector
☆156Oct 5, 2023Updated 2 years ago
Alternatives and similar repositories for ACCD
Users that are interested in ACCD are comparing it to the libraries listed below
Sorting:
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆487Feb 23, 2026Updated last week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- An offensive data enrichment pipeline☆919Updated this week
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- The TTPForge is a Cybersecurity Framework for developing, automating, and executing attacker Tactics, Techniques, and Procedures (TTPs).☆412Updated this week
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,097Jun 10, 2024Updated last year
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 4 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆676Dec 23, 2022Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Jul 12, 2023Updated 2 years ago
- ☆252Jun 7, 2025Updated 8 months ago
- ☆79Aug 2, 2023Updated 2 years ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆614Jan 2, 2025Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆568Jan 20, 2026Updated last month
- ☆615Jun 1, 2023Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,413Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆301Oct 26, 2022Updated 3 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆502May 16, 2023Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆517Jul 15, 2022Updated 3 years ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆431Feb 18, 2026Updated last week
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Jul 15, 2023Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,927Jan 20, 2026Updated last month
- ☆223Oct 22, 2023Updated 2 years ago
- Hunting queries and detections☆883Oct 30, 2025Updated 4 months ago