ubeeri / Invoke-UserSimulatorLinks
Simulates common user behaviour on local and remote Windows hosts.
☆282Updated 7 years ago
Alternatives and similar repositories for Invoke-UserSimulator
Users that are interested in Invoke-UserSimulator are comparing it to the libraries listed below
Sorting:
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆396Updated last year
- Credential and Red Teaming Defense for Windows Environments☆329Updated last year
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- Some PowerShell Stuff☆281Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆232Updated 5 years ago
- Powershell Threat Hunting Module☆284Updated 8 years ago
- ☆200Updated 3 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆491Updated 6 years ago
- Tool Analysis Result Sheet☆354Updated 7 years ago
- ☆350Updated 4 years ago
- The PoLRBear Project☆35Updated 4 years ago
- ☆283Updated 7 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆236Updated 3 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆451Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated 3 months ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 4 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 6 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Sysmon Tools for PowerShell☆230Updated 6 years ago
- ☆169Updated 5 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆297Updated 9 months ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆200Updated 7 years ago
- Test Blue Team detections without running any attack.☆271Updated last year
- PowerShell - Rapid Response... For the incident responder in you!☆300Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆201Updated 7 months ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆160Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 11 months ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆94Updated 7 years ago