invoke-atomicredteam
atomic-red-team
invoke-atomicredteam | atomic-red-team | |
---|---|---|
5 | 32 | |
767 | 9,059 | |
1.6% | 1.4% | |
8.3 | 9.7 | |
5 days ago | 6 days ago | |
PowerShell | C | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
invoke-atomicredteam
-
Lack of Detections
Or if you want something with more features - use Atomic Red Team tests (https://github.com/redcanaryco/invoke-atomicredteam)
-
EDR Attack Simulation
Also, if you want to use Atomic Red Team (which you should), look towards https://github.com/redcanaryco/invoke-atomicredteam, a framework for automating usage of tests through that.
-
Cyber incident simulation script
powershell-based - https://github.com/redcanaryco/invoke-atomicredteam
-
Anyone have experience building a Windows AD lab environment in Docker?
However, I've been tinkering with this for a few days now without success so far. I'm running into bugs and also am simply uncertain whether this is even viable. For example, I don't know if the Windows images offered for Docker will support the commands run by the PowerShell testing suite we have in mind for simulating threats, Invoke-AtomicRedTeam. Theoretically, everything should work fine. I'm also curious if someone else has already done this and published setup scripts or anything to help.
- Best way to test an AV/EDR Solution
atomic-red-team
-
Which Antivirus do you recommend and why?
You can write your own or look at testing tools like Cytest to ensure that your business goals are met and to ensure your sensors are configured correctly, and ART for attack chains.
-
Exfiltration Detections
I had heard that Falcon Overwatch has a detection for Exfiltration for C2, but I was not able to trigger it using my personal Kali Machine to host a C2 server with https://github.com/cedowens/SimpleC2_Server and then used Atomic Red Team: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1041/T1041.md
- EDR Attack Simulation
-
Red Team Methodology
Yup what the above said, you can use atomic red https://github.com/redcanaryco/atomic-red-team
-
“Malicious” powershell commands for demo
Atomic red team have tests that should trigger it, it also has a clear description of what it does and how to clean up afterwards. https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1059.001/T1059.001.md suggest that you try obfuscation or cradle.
-
Initial acess simulation tests
Dated but still full of goodness. https://github.com/redcanaryco/atomic-red-team/tree/e88a1ea463964839e267dba74ec1cf7bf634ccbf/ARTifacts/Initial_Access
-
What are some good showcases of Collection-tactics of the MITRE ATT&CK matrix?
Are you familiar with Atomic Red Team? Many quick & practical sample tests you can often run without much effort or prep work. All tests map to Techniques - a quick way to search through them all at the Tactic level is by searching within the CSV index of all their current tests here (I counted ~50 Collection-related tests just now): https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes/Indexes-CSV/index.csv
-
Testing an XDR solution
Check out Atomic Red Team’s Redcanary.
- Blue Teamers: What makes a good detection use case?
- Custom IOAs: What's The Best Resource/Documentation For This On CS Falcon
What are some alternatives?
APTSimulator - A toolset to make a system look as if it was the victim of an APT attack
detection-rules - Rules for Elastic Security's detection engine
PurpleCloud - A little tool to play with Azure Identity - Azure Active Directory lab creation tool
sigma - Main Sigma Rule Repository
jupyter2kibana - A Workflow for Data Scientists to bring Jupyter Notebook Visualizations to Kibana Dashboards
BLUESPAWN - An Active Defense and EDR software to empower Blue Teams
ansible-pentest-deploy - Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with the tools that they need for penetration testing.
sysmon-modular - A repository of sysmon configuration modules
cli - The Docker CLI
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
EDR-Telemetry - This project aims to compare and evaluate the telemetry of various EDR products.
public-pentesting-reports - A list of public penetration test reports published by several consulting firms and academic security groups.