cbecks2 / edr-artifacts
This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.
☆72Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for edr-artifacts
- Microsoft Graph API post-exploitation toolkit☆92Updated 4 months ago
- Living Off the Foreign Land setup scripts☆63Updated 3 weeks ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 4 months ago
- ☆68Updated last year
- ☆129Updated last month
- ☆76Updated this week
- Yara Rules for Modern Malware☆67Updated 8 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆106Updated 6 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 6 months ago
- ☆44Updated 3 weeks ago
- ☆109Updated 3 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆88Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆83Updated 5 months ago
- ☆44Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆53Updated 3 weeks ago
- Decrypt GlobalProtect configuration and cookie files.☆138Updated 2 months ago
- BloodHound PowerShell client☆45Updated last month
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆123Updated 3 months ago
- Detect WFP filters blocking EDR communications☆81Updated 10 months ago
- C2 Infrastructure Automation☆86Updated last week
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- Async Python library to parse local and remote disk images.☆75Updated 2 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated 4 months ago
- ☆83Updated 2 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆53Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago