Jesse Moore's Projects
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Active Directory Generator for upcoming domain pivoting course.
Tactical Trade Craft | Building capabilities to overcome defenses
Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors
Set up a personal VPN in the cloud
Ansible Pilot YouTube channel code repository
Ansible role to manage windows installation
Ansible Role to Install and Configure Velocidex Velociraptor
A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools
Any Hostname alters all WordPress-generated URLs according to the servers current hostname, so that they will always correspond to the actual hostname as entered by the user, as opposed to always using the URL specified in the WordPress options. The plugin is ideal for making a site available across multiple domains.
Install Script for ApacheGuacamole
Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Purple Teaming Attack & Hunt Lab - Terraform
A Docker container for remote penetration testing.
Arsenal is just a quick inventory and launcher for hacking programs
ATT&CK Remote Threat Hunting Incident Response
Atomic Red Team Simple Parser
A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.
Small and highly portable detection tests based on MITRE's ATT&CK.
A very simple way of running Atomic Red Team tests!
An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository contains an Angular-based web application providing the user interface for the ATT&CK Workbench application.
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010
AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2019, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.