cbecks2 / edr-artifacts
This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.
☆78Updated 8 months ago
Alternatives and similar repositories for edr-artifacts:
Users that are interested in edr-artifacts are comparing it to the libraries listed below
- ☆23Updated 2 months ago
- Living off the land searches for explorer and sharepoint☆80Updated last week
- ☆80Updated 5 months ago
- ☆149Updated 3 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated last week
- Detect WFP filters blocking EDR communications☆86Updated last year
- ☆116Updated 3 years ago
- Living Off the Foreign Land setup scripts☆67Updated 2 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆45Updated last month
- Yara Rules for Modern Malware☆77Updated last year
- a tiny program to consume from ETW providers for research☆47Updated 4 months ago
- A Python POC for CRED1 over SOCKS5☆148Updated 7 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆68Updated this week
- Adversary Emulation Framework☆98Updated 9 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 10 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 10 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆90Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆38Updated 3 months ago
- BloodHound PowerShell client☆52Updated 3 weeks ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 9 months ago
- 🌩️ Collection of BloodHound queries for Azure☆64Updated 3 months ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆30Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated last year
- Lifetime AMSI bypass.☆34Updated 2 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆16Updated 4 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 9 months ago
- Default Detections for EDR☆96Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 4 months ago