ubeeri / Invoke-UserSimulatorLinks
Simulates common user behaviour on local and remote Windows hosts.
☆281Updated 7 years ago
Alternatives and similar repositories for Invoke-UserSimulator
Users that are interested in Invoke-UserSimulator are comparing it to the libraries listed below
Sorting:
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆402Updated last year
- Credential and Red Teaming Defense for Windows Environments☆330Updated last year
- Some PowerShell Stuff☆280Updated 3 years ago
- Automated, Collection, and Enrichment Platform☆324Updated 6 years ago
- A PowerShell module to deploy active directory decoy objects.☆239Updated 6 years ago
- Powershell Threat Hunting Module☆288Updated 9 years ago
- ☆202Updated 4 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Updated 6 years ago
- ☆282Updated 8 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- Tool Analysis Result Sheet☆356Updated 8 years ago
- ☆348Updated 4 years ago
- Sysmon Tools for PowerShell☆232Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆239Updated 10 months ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Updated 4 years ago
- Test Blue Team detections without running any attack.☆272Updated last year
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆465Updated 8 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆167Updated 7 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Updated 5 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Updated 2 months ago
- Tools to automate and/or expedite response.☆116Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆206Updated last year
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 7 years ago
- ☆167Updated 5 years ago
- Web application to create indexes for GIAC certification examinations.☆149Updated 2 years ago
- Assorted scripts and one off things☆271Updated last year
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Updated 8 years ago
- PowerShell - Rapid Response... For the incident responder in you!☆305Updated 6 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago