trustedsec / User-Behavior-Mapping-ToolLinks
☆168Updated 2 years ago
Alternatives and similar repositories for User-Behavior-Mapping-Tool
Users that are interested in User-Behavior-Mapping-Tool are comparing it to the libraries listed below
Sorting:
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago
- ☆195Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆256Updated 3 years ago
- ☆184Updated last year
- ☆119Updated 4 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated 2 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- A tool for pointesters to find candies in SharePoint☆273Updated 3 years ago
- SpecterOps Presentations☆209Updated last month
- ☆144Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆325Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 9 months ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆62Updated 10 years ago
- InfoSec Notes☆60Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- Collection of tools to use with Azure Applications☆112Updated 2 years ago
- ☆209Updated 3 years ago
- ☆153Updated 9 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆128Updated last year
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆231Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆106Updated 2 years ago
- ☆105Updated 3 years ago
- ☆125Updated last year
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆100Updated 3 years ago