A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Yara4Pentesters is a set of YARA rules designed to identify files containing juicy information like usernames, passwords, etc. It is a powerful tool for searching and identifying files containing sensitive information. This tool is useful for forensic analysis, incident response, and penetration testing. The rules are designed to be used with the YARA engine and can be used to search for files containing sensitive information such as usernames, passwords, credit card numbers, and more. The tool is also useful for searching for files containing specific tags or keywords. The tool is available for download and can be used with the YARA engine. References: https://www.cgsecurity.org/wiki/File_Formats_Recovered_By_PhotoRec
A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.
Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.
A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
SharpPrinter enables efficient discovery of network printers for security and management purposes.