Alex Rydzak's starred repositories
APT-Attack-Simulation
This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools that attackers might have used in actual attacks. These tools and TTPs are simulated here.
Red-Teaming-TTPs
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
Get-ReverseShell
A solution to create obfuscated reverse shells for PowerShell.
Invoke-PSObfuscation
An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.
MSIdentityTools
Repository for the Microsoft Identity Tools PowerShell module which provides various tools for performing enhanced Identity administration activities.
IntuneDeviceQuery
This repository contains a wide array of KQL Queries ready for you to easily copy, paste, and execute within Intune.
Active-Directory-Exploitation-Cheat-Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Microsoft-Blue-Forest
Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers
steam-lancache-prefill
CLI tool to automatically prime a Lancache with Steam games
changedetection.io
The best and simplest free open source web page change detection, website watcher, restock monitor and notification service. Restock Monitor, change detection. Designed for simplicity - Simply monitor which websites had a text change for free. Free Open source web page change detection, Website defacement monitoring, Price change notification
Upload_Bypass
A simple tool for bypassing file upload restrictions.
Windows-Event-Logs-With-Event-IDs
A running list of Windows sources and the related event ids.
nuclei-burp-plugin
Nuclei plugin for BurpSuite
ThreatCheck
Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
threat-composer
A simple threat modeling tool to help humans to reduce time-to-value when threat modeling