Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Lateral Movement
Browse 18 security tools
AI-orchestrated XDR platform unifying Zero Trust across IT, OT, and IoT/Edge.
Cyber deception platform for early threat detection, attacker engagement & response.
Deception platform using decoys to detect lateral movement & identity attacks.
Agentless network defense platform using deception to preemptively disrupt threats.
Agentless deception platform with internal & external decoy deployment.
Subscription-based enterprise red team simulation labs with AD focus.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
ML-based multi-cloud workload visibility with continuous attack graph tracking.
Active Directory deception technology for threat detection and response
AI-powered threat hunting platform for detecting lateral movement & insider threats
Real-time runtime visibility platform for detecting active exploitation
AI-powered deception platform for cloud threat detection using honeytokens
AI-powered deception platform for early APT and advanced threat detection
Threat emulation tool for adversary simulations and red team operations
A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.
A comprehensive repository of open-source security tools organized by attack phases for red team operations, adversary simulation, and threat hunting purposes.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.