Loading...
Browse 80 lateral movement tools
Access intelligence platform for mapping access paths and enforcing least privilege
Access intelligence platform for mapping access paths and enforcing least privilege
Privileged access security platform for discovery, classification & protection
Privileged access security platform for discovery, classification & protection
Identity-based access control & segmentation to block lateral movement
Identity-based access control & segmentation to block lateral movement
AI-powered network threat detection across hybrid environments
AI-powered network threat detection across hybrid environments
AI-driven threat detection platform identifying malicious behaviors across networks
AI-driven threat detection platform identifying malicious behaviors across networks
NDR platform for threat detection and response via network traffic monitoring
NDR platform for threat detection and response via network traffic monitoring
Cloud-native NDR with AI-based threat detection for SMBs
Cloud-native NDR with AI-based threat detection for SMBs
Exposure validation platform combining BAS and attack path validation (CART)
Exposure validation platform combining BAS and attack path validation (CART)
ITDR platform integrated with XDR for identity protection and threat detection
ITDR platform integrated with XDR for identity protection and threat detection
Automated ransomware attack emulation platform for defense validation
Automated ransomware attack emulation platform for defense validation
Automated internal network penetration testing and security validation platform
Automated internal network penetration testing and security validation platform
Threat emulation tool for adversary simulations and red team operations
Threat emulation tool for adversary simulations and red team operations
Network appliance detecting advanced threats via sandboxing & traffic analysis
Network appliance detecting advanced threats via sandboxing & traffic analysis
Identity threat detection and response platform for hybrid environments
Identity threat detection and response platform for hybrid environments
Detects & blocks identity-based threats in real-time across hybrid environments
Detects & blocks identity-based threats in real-time across hybrid environments
Microsegmentation solution for preventing lateral movement in networks
Microsegmentation solution for preventing lateral movement in networks
AI-driven NDR platform detecting threats across network, identity, and cloud
AI-driven NDR platform detecting threats across network, identity, and cloud
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.
A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
A post-exploitation framework designed to operate covertly on heavily monitored environments.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.
Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance