sisoc-tokyo / Real-timeDetectionAD_ver2Links
☆82Updated 4 years ago
Alternatives and similar repositories for Real-timeDetectionAD_ver2
Users that are interested in Real-timeDetectionAD_ver2 are comparing it to the libraries listed below
Sorting:
- Simulating Adversary Operations☆93Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 5 years ago
- ☆53Updated 6 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Splunk Dashboard for CobaltStrike logs☆89Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 6 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆119Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆170Updated 3 months ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆56Updated 10 months ago
- ☆140Updated 5 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 6 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Updated 8 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆139Updated 7 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- The new name is DeTT&CT☆24Updated 5 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆42Updated 6 years ago