ubeeri / Invoke-UserSimulator
Simulates common user behaviour on local and remote Windows hosts.
☆282Updated 6 years ago
Alternatives and similar repositories for Invoke-UserSimulator:
Users that are interested in Invoke-UserSimulator are comparing it to the libraries listed below
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆396Updated last year
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated 9 months ago
- Tool Analysis Result Sheet☆348Updated 7 years ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- A PowerShell module to deploy active directory decoy objects.☆227Updated 5 years ago
- Some PowerShell Stuff☆281Updated 2 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆488Updated 6 years ago
- Test Blue Team detections without running any attack.☆272Updated 11 months ago
- ☆350Updated 4 years ago
- ☆282Updated 7 years ago
- ☆200Updated 3 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆234Updated 3 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 6 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated 3 weeks ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 4 months ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆202Updated 3 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Atomic Purple Team Framework and Lifecycle☆294Updated 4 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Updated 7 years ago
- Tools to automate and/or expedite response.☆113Updated 9 months ago
- ☆276Updated 2 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- ☆169Updated 5 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆295Updated 6 months ago
- Sysmon Tools for PowerShell☆229Updated 6 years ago