huntresslabs / rogueapps
When good OAuth apps go rogue. Documents observed OAuth application tradecraft
☆43Updated last month
Related projects ⓘ
Alternatives and complementary repositories for rogueapps
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆59Updated 3 weeks ago
- Anvilogic Forge☆86Updated last week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆98Updated last month
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆22Updated 2 months ago
- ☆72Updated this week
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆22Updated 2 months ago
- pocket guide for core detection engineering concepts☆27Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 10 months ago
- A tool that allows you to document and assess any security automation in your SOC☆41Updated 3 weeks ago
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆44Updated this week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆66Updated last week
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆24Updated 4 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 3 weeks ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 4 months ago
- ☆68Updated last month
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆93Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆161Updated last month
- Baseline a Windows System against LOLBAS☆25Updated 6 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆79Updated 3 months ago
- ☆83Updated 3 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated last month
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆92Updated 11 months ago
- https://lolad-project.github.io/☆62Updated 2 weeks ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆101Updated 6 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- ☆37Updated 2 months ago
- M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.☆112Updated this week