Immersive-Labs-Sec / msrc-api
A collection of tools to interact with Microsoft Security Response Center API
☆95Updated last year
Alternatives and similar repositories for msrc-api:
Users that are interested in msrc-api are comparing it to the libraries listed below
- Cobalt Strike Beacon configuration extractor and parser.☆149Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆227Updated 8 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆222Updated 10 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- A repo to support the book☆105Updated 3 years ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- Fraktal's Ransomware Emulator☆101Updated 9 months ago
- ☆196Updated 2 months ago
- Active C&C Detector☆152Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆318Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆73Updated last year
- My conference presentations☆66Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆313Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆156Updated 3 months ago
- Execute PowerShell code at the antimalware-light protection level.☆140Updated 2 years ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆104Updated last week
- Load any Beacon Object File using Powershell!☆245Updated 3 years ago
- Default Detections for EDR☆96Updated 10 months ago
- ☆184Updated 2 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆218Updated 3 years ago
- Active Directory Purple Team Playbook☆105Updated last year
- ☆204Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated 10 months ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆89Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆148Updated 3 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆141Updated this week
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆146Updated last year