PlumHound / PlumHound-TasksLinks
Community Tasks/Plans for PlumHound Queueing
☆23Updated 2 years ago
Alternatives and similar repositories for PlumHound-Tasks
Users that are interested in PlumHound-Tasks are comparing it to the libraries listed below
Sorting:
- Active Directory Purple Team Playbook☆113Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆151Updated last year
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Defensive Origins Training Schedule☆39Updated last year
- Pushes Sysmon Configs☆88Updated 4 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆70Updated last month
- Purple Team Security☆75Updated 3 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- The PoLRBear Project☆35Updated 4 years ago
- ☆29Updated 5 years ago
- My conference presentations☆87Updated this week
- ☆68Updated 4 years ago
- PoSh BloodHound Dog Whisperer☆192Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 6 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 11 months ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 3 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Carbon Black TAU Excel 4 Macro Analysis☆44Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆105Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆236Updated 6 years ago
- Kerberoast Detection Script☆30Updated last year
- ☆47Updated 3 weeks ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Updated 2 years ago
- ☆42Updated 2 years ago
- ☆53Updated last month
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆142Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Updated 4 years ago