APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Remove dependencies: axios and http-proxy-agent. Both are used in app.emissary.js only.
Use existing dependencies got and hpagent in app.emissary.js instead.
There is an example of how got and hpagent is being used in zAp.js.
Do something similar, may not need to extend though.
PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpose of generating attack telemetry in properly monitored Windows enterprise environments
In the app-scanner:
Remove dependencies: axios and http-proxy-agent. Both are used in app.emissary.js only.
Use existing dependencies got and hpagent in app.emissary.js instead.
There is an example of how got and hpagent is being used in zAp.js.
Do something similar, may not need to
extendthough.