iknowjason / GHOSTSPlaygroundLinks
A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.
☆18Updated 10 months ago
Alternatives and similar repositories for GHOSTSPlayground
Users that are interested in GHOSTSPlayground are comparing it to the libraries listed below
Sorting:
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆17Updated 7 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago
- ☆47Updated last month
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 5 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Updated last week
- Baseline a Windows System against LOLBAS☆27Updated last year
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆11Updated this week
- ☆18Updated 2 years ago
- ☆74Updated 2 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 9 months ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆74Updated last month
- A simple tool designed to create Atomic Red Team tests with ease.☆43Updated 2 months ago
- Presentations from Conferences☆29Updated 8 months ago
- Living off the False Positive!☆37Updated 4 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated last year
- Slides of my public talks☆55Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 11 months ago
- My Notes from Hugging Face AI Agents Course☆13Updated 3 months ago
- create a "simulated internet" cyber range environment☆16Updated last week
- ☆25Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 2 months ago
- ASR Configurator, Essentials and Atomic Testing☆42Updated last month
- ☆25Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 9 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 2 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 6 months ago
- A tool to create randomly insecure file shares that also contain unsecured credential files☆41Updated last year