ubeeri / Invoke-UserSimulatorLinks
Simulates common user behaviour on local and remote Windows hosts.
☆281Updated 7 years ago
Alternatives and similar repositories for Invoke-UserSimulator
Users that are interested in Invoke-UserSimulator are comparing it to the libraries listed below
Sorting:
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆398Updated last year
- Credential and Red Teaming Defense for Windows Environments☆331Updated last year
- A PowerShell module to deploy active directory decoy objects.☆233Updated 5 years ago
- Powershell Threat Hunting Module☆285Updated 8 years ago
- ☆200Updated 3 years ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- Some PowerShell Stuff☆280Updated 3 years ago
- Tool Analysis Result Sheet☆356Updated 7 years ago
- ☆282Updated 7 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Updated 6 years ago
- ☆350Updated 4 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆237Updated 4 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆455Updated 7 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 6 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated 11 months ago
- Test Blue Team detections without running any attack.☆271Updated last year
- Searches For Threat Hunting and Security Analytics☆240Updated 5 months ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆200Updated 7 years ago
- Sysmon Tools for PowerShell☆230Updated 7 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆205Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆203Updated 8 months ago
- PowerShell - Rapid Response... For the incident responder in you!☆301Updated 5 years ago
- Respounder detects presence of responder in the network.☆318Updated 6 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆322Updated 4 years ago
- ☆169Updated 5 years ago
- Invoke-LiveResponse☆148Updated 3 years ago