iknowjason / GHOSTSPlaygroundLinks
A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.
☆18Updated 11 months ago
Alternatives and similar repositories for GHOSTSPlayground
Users that are interested in GHOSTSPlayground are comparing it to the libraries listed below
Sorting:
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆17Updated 7 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago
- ☆74Updated this week
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated last month
- ☆47Updated 2 months ago
- ☆26Updated 2 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 6 months ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆12Updated 3 weeks ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆41Updated 5 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆77Updated 2 weeks ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- Presentations from Conferences☆29Updated 9 months ago
- Baseline a Windows System against LOLBAS☆27Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆32Updated last week
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 7 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆44Updated 3 months ago
- ☆25Updated 3 years ago
- ☆18Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- create a "simulated internet" cyber range environment☆17Updated last month
- Living off the False Positive!☆37Updated 4 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆40Updated 5 months ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆42Updated last year
- ☆21Updated 2 years ago