TH3xACE / EDR-Test
Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].
☆149Updated last year
Alternatives and similar repositories for EDR-Test:
Users that are interested in EDR-Test are comparing it to the libraries listed below
- ☆159Updated last year
- Active C&C Detector☆152Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆96Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- Default Detections for EDR☆96Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆55Updated 10 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- ☆115Updated 3 years ago
- ☆178Updated 3 months ago
- SpecterOps Presentations☆189Updated 4 months ago
- C2 Automation using Linode☆80Updated 2 years ago
- Sigma rules to share with the community☆119Updated last month
- Azure AD cheatsheet for the CARTP course☆108Updated 2 years ago
- IOC Collection 2022☆57Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 11 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Active Directory Purple Team Playbook☆106Updated last year
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated 8 months ago
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆163Updated 5 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆317Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆92Updated 2 years ago
- ☆63Updated 3 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- ☆80Updated 4 months ago