S3N4T0R-0X0 / APT28-Adversary-Simulation
This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
☆33Updated 9 months ago
Alternatives and similar repositories for APT28-Adversary-Simulation:
Users that are interested in APT28-Adversary-Simulation are comparing it to the libraries listed below
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago
- ☆37Updated 11 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- BloodHound PowerShell client☆51Updated last week
- ☆22Updated last month
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 5 months ago
- ☆51Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- ☆34Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated 3 weeks ago
- ☆32Updated 2 years ago
- ☆40Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆32Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆79Updated last month
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- ☆80Updated 4 months ago
- Lifetime AMSI bypass.☆35Updated 8 months ago
- vulnlab.com reaper writeup☆26Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 9 months ago
- Deploy a phishing infrastructure on the fly.☆68Updated 3 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆38Updated 2 weeks ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Shellcode loader based on indirect syscall☆21Updated last month
- Microsoft Graph API post-exploitation toolkit☆94Updated 8 months ago