APTSimulator
EDR-Telemetry
APTSimulator | EDR-Telemetry | |
---|---|---|
7 | 4 | |
2,384 | 1,195 | |
1.6% | - | |
0.0 | 7.3 | |
11 months ago | about 2 months ago | |
Batchfile | PowerShell | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
APTSimulator
-
Lack of Detections
APTSim is also a common choice (https://github.com/NextronSystems/APTSimulator)
-
EDR Attack Simulation
https://github.com/NextronSystems/APTSimulator is another common choice for this.
- how worthless is windows defender after all?
-
If you could name 5 tools/software worth learning for a cybersecurity analyst to become more employable, what would they be?
https://github.com/NextronSystems/APTSimulator APT Simulator is a Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised. In contrast to other adversary simulation tools, APT Simulator is designed to make the application as simple as possible. You don't need to run a web server, database or any agents on set of virtual machines. Just download the prepared archive, extract and run the contained Batch file as Administrator. Running APT Simulator takes less than a minute of your time.
- Bulk Extractor showing Explicit Websites
- How to keep a SOC on their toes
-
APTSimulator 0.9.0 featuring Cobalt Strike beacon activity simulation
Here’s the direct link: https://github.com/NextronSystems/APTSimulator
EDR-Telemetry
-
Process Access and Tampering Logs Available in Elastic Search with Elastic Agent?
I have been exploring Elastic Agent and noticed references to its ability to collect data pertaining to process access and process tampering events. (EDR Telemetry Project https://github.com/tsale/EDR-Telemetry) However, when I attempt to search for these specific types of data within Elastic Search, I have been unable to locate them. Within the event.category of "Process", I see only "start" or "end".
-
EDR Attack Simulation
You can easily see some of the weak points of each EDR through the telemetry project. Be sure to update it if you find differences. https://github.com/tsale/EDR-Telemetry
- EDR-Telemetry: This project aims to compare and evaluate the telemetry of various EDR products.
- EDR-Telemetry: This project aims to compare and evaluate the telemetry of various EDR products
What are some alternatives?
atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK.
invoke-atomicredteam - Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red-team/tree/master/atomics) of Red Canary's Atomic Red Team project.
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
ThreatSim - Threat Simulator for Enterprise Networks
monkey - Infection Monkey - An open-source adversary emulation platform
Notes
ransomware-simulator - Ransomware simulator written in Golang