FREE DETECTION TOOLS
Topics (1)
Comparing open source adversary emulation platforms for red teams
Comparing open source adversary emulation platforms for red teams
Invoke-Atomic leaves the nest
Invoke-Atomic leaves the nest
Introducing Chain Reactor
Introducing Chain Reactor
Testing initial access with “Generate-Macro” in Atomic Red Team
Testing initial access with “Generate-Macro” in Atomic Red Team
Testing the Top MITRE ATT&CK Techniques: PowerShell, Scripting, Regsvr32
Testing the Top MITRE ATT&CK Techniques: PowerShell, Scripting, Regsvr32
Are You Using Tabletop Simulations to Improve Your Information Security Program?
Are You Using Tabletop Simulations to Improve Your Information Security Program?
Password Filters (T1174): Live Discussion on Detection Challenges and Strategies
Password Filters (T1174): Live Discussion on Detection Challenges and Strategies
Red Team vs Red Canary: How Sparring with Customers Improves Security
Red Team vs Red Canary: How Sparring with Customers Improves Security