There are 18 repositories under purpleteam topic.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
The goal of this repository is to document the most common techniques to bypass AppLocker.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
A collection of sources of documentation, as well as field best practices, to build/run a SOC
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Hunting queries and detections
Purple Team Exercise Framework
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Slack enumeration and exposed secrets detection tool
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
Atomic Purple Team Framework and Lifecycle
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Finding exposed secrets and personal data in GitLab
Purpleteam scripts simulation & Detection - trigger events for SOC detections
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Purple Teaming Attack & Hunt Lab - Terraform
Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.
CLI component of OWASP PurpleTeam
Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's using GPT-4 Vision to analyze them and construct daily activity — frame by frame
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Provides various Windows Server Active Directory (AD) security-focused reports.
Protection against HTML smuggling attacks.
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense