S3N4T0R-0X0 / APT28-Adversary-Simulation
This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
☆32Updated 8 months ago
Alternatives and similar repositories for APT28-Adversary-Simulation:
Users that are interested in APT28-Adversary-Simulation are comparing it to the libraries listed below
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆33Updated 3 weeks ago
- BloodHound PowerShell client☆49Updated last week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 5 months ago
- ☆40Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆57Updated last month
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- ☆36Updated 10 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆49Updated 2 weeks ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Two in one, patch lifetime powershell console, no more etw and amsi!☆83Updated 7 months ago
- Lifetime AMSI bypass.☆35Updated 7 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆73Updated 3 months ago
- ☆32Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 8 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆30Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆36Updated 2 months ago
- ☆80Updated 2 months ago
- ☆51Updated last year
- Microsoft Graph API post-exploitation toolkit☆93Updated 7 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆82Updated last month
- ☆25Updated last year
- PowerShell Reverse Shell☆61Updated last year
- Windows Administrator level Implant.☆48Updated 4 months ago
- ☆52Updated 2 months ago
- Living Off the Foreign Land setup scripts☆64Updated last month
- ☆34Updated last year