Repository navigation
purpleteam
- Website
- Wikipedia
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
The all-in-one browser extension for offensive security professionals 🛠
The goal of this repository is to document the most common techniques to bypass AppLocker.
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
A collection of sources of documentation, as well as field best practices, to build/run a SOC
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Bloodhound Reporting for Blue and Purple Teams
Hunting queries and detections
Purple Team Exercise Framework
Practical Windows Forensics Training
Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.
A little tool to play with Azure Identity - Azure and Entra ID lab creation tool. Blog: https://medium.com/@iknowjason/sentinel-for-purple-teaming-183b7df7a2f4
Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
Slack enumeration and exposed secrets detection tool
Atomic Purple Team Framework and Lifecycle
This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Diablo ~ Hacking / Pentesting & Reporting
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Finding exposed secrets and personal data in GitLab