CyberSecurityUP / EDR-AssessmentLinks
This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Response (EDR) systems
β62Updated last year
Alternatives and similar repositories for EDR-Assessment
Users that are interested in EDR-Assessment are comparing it to the libraries listed below
Sorting:
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ84Updated last year
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β81Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data β¦β150Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- https://lolad-project.github.io/β84Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europeβ37Updated last year
- β74Updated this week
- Completely Risky Active-Directory Simulation Hubβ102Updated 2 years ago
- CarbonBlack EDR detection rules and response actionsβ73Updated last year
- β24Updated 2 years ago
- β24Updated 10 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create advβ¦β226Updated 8 months ago
- A collection of CVEs weaponized by ransomware operatorsβ128Updated 2 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiastsβ¦β106Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.β49Updated 9 months ago
- Baseline a Windows System against LOLBASβ69Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β105Updated 2 years ago
- β100Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.β43Updated 11 months ago
- β24Updated 10 months ago
- Various AD tools needed for penetration testing in one place.β24Updated 2 years ago
- β44Updated last year
- β117Updated 2 weeks ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.β46Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local filesβ127Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for themβ29Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.β194Updated 10 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTestβ18Updated last year
- Powershell tools used for Red Team / Pentesting.β79Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It prβ¦β107Updated 9 months ago