Qazeer / FarsightAD
PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise
☆93Updated last year
Related projects ⓘ
Alternatives and complementary repositories for FarsightAD
- Default Detections for EDR☆94Updated 9 months ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Active C&C Detector☆150Updated last year
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆60Updated 7 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆309Updated 2 years ago
- ☆80Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- GolenGMSA tool for working with GMSA passwords☆136Updated 7 months ago
- ☆173Updated 9 months ago
- Protect your Domain Controllers by auditing and restricting LDAP requests☆103Updated 2 weeks ago
- ☆98Updated 2 years ago
- ☆13Updated last year
- ☆62Updated 7 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- ☆34Updated last year
- InfoSec Notes☆53Updated 7 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆67Updated 8 months ago
- ☆241Updated last year
- Collection of tools to use with Azure Applications☆107Updated last year
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- Abuse Azure API permissions for red teaming☆58Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆112Updated this week
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Living off the False Positive!☆29Updated 2 months ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Updated last month