Qazeer / FarsightADLinks
PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory domain compromise
☆97Updated last month
Alternatives and similar repositories for FarsightAD
Users that are interested in FarsightAD are comparing it to the libraries listed below
Sorting:
- Default Detections for EDR☆96Updated last year
- Active C&C Detector☆156Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- ☆86Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆153Updated 2 weeks ago
- InfoSec Notes☆59Updated last year
- ☆105Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Initial triage of Windows Event logs☆104Updated last year
- ☆98Updated 4 months ago
- ☆107Updated 2 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- AAD related enumeration in Nim☆132Updated 2 years ago
- GolenGMSA tool for working with GMSA passwords☆164Updated 4 months ago
- ☆182Updated last year
- Collection of tools to use with Azure Applications☆111Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆16Updated 2 years ago
- ☆110Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆113Updated 4 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- ☆33Updated last year
- Location of some Active Directory lab scripts I have created and find useful☆85Updated 3 weeks ago