TH3xACE / EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
☆146Updated last year
Alternatives and similar repositories for EDR-Test:
Users that are interested in EDR-Test are comparing it to the libraries listed below
- Active C&C Detector☆152Updated last year
- ☆156Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 8 months ago
- This repo is where I store my Threat Hunting ideas/content☆86Updated last year
- Default Detections for EDR☆96Updated 10 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆96Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- ☆62Updated 3 years ago
- IOC Collection 2022☆56Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆250Updated 2 years ago
- ☆174Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆172Updated 3 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆158Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- SpecterOps Presentations☆184Updated 2 months ago
- Azure AD cheatsheet for the CARTP course☆102Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆313Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆72Updated last month
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- ☆77Updated last month
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- ☆41Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆251Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Sigma rules to share with the community☆115Updated 3 months ago
- C2 Automation using Linode☆78Updated 2 years ago
- ☆112Updated 3 years ago