ubeeri / Invoke-UserSimulatorLinks
Simulates common user behaviour on local and remote Windows hosts.
☆281Updated 7 years ago
Alternatives and similar repositories for Invoke-UserSimulator
Users that are interested in Invoke-UserSimulator are comparing it to the libraries listed below
Sorting:
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆402Updated last year
- Credential and Red Teaming Defense for Windows Environments☆330Updated last year
- Automated, Collection, and Enrichment Platform☆324Updated 6 years ago
- A PowerShell module to deploy active directory decoy objects.☆240Updated 6 years ago
- Powershell Threat Hunting Module☆288Updated 9 years ago
- ☆202Updated 4 years ago
- Some PowerShell Stuff☆280Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆491Updated 6 years ago
- Tool Analysis Result Sheet☆356Updated 8 years ago
- ☆348Updated 4 years ago
- ☆282Updated 8 years ago
- Tools to automate and/or expedite response.☆116Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆239Updated 10 months ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 7 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Updated 4 years ago
- Sysmon Tools for PowerShell☆232Updated 7 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated 2 months ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆465Updated 8 years ago
- Test Blue Team detections without running any attack.☆272Updated last year
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Updated 5 years ago
- ☆308Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Updated last year
- PowerShell - Rapid Response... For the incident responder in you!☆305Updated 6 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Updated 6 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 6 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 5 years ago