Immersive-Labs-Sec / msrc-api
A collection of tools to interact with Microsoft Security Response Center API
☆97Updated last year
Alternatives and similar repositories for msrc-api:
Users that are interested in msrc-api are comparing it to the libraries listed below
- Cobalt Strike Beacon configuration extractor and parser.☆153Updated 3 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆317Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- ☆236Updated 10 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆235Updated 3 weeks ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆322Updated last year
- Yara Rules for Modern Malware☆74Updated last year
- Powershell Event Tracing Toolbox☆75Updated 3 years ago
- Execute PowerShell code at the antimalware-light protection level.☆140Updated 2 years ago
- ☆189Updated 2 years ago
- Active C&C Detector☆153Updated last year
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆253Updated last year
- Default Detections for EDR☆96Updated last year
- Load any Beacon Object File using Powershell!☆249Updated 3 years ago
- My conference presentations☆66Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆164Updated last week
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- ☆200Updated 5 months ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆223Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- ☆214Updated 2 years ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆151Updated 2 months ago
- ☆207Updated 3 years ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆164Updated 2 months ago
- Fraktal's Ransomware Emulator☆102Updated 11 months ago
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago