ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

46,411 results

Prabh Nair
Adversary Simulation vs Adversary Emulation Explained

Welcome, Cybersecurity Enthusiasts! Today, we're diving deep into the realms of digital defense, exploring the differences and ...

18:07
Adversary Simulation vs Adversary Emulation Explained

3,247 views

2 years ago

Security Today
Adversary Emulation Explained | Cybersecurity Red Teaming vs Simulation

Adversary emulation is one of the most powerful cybersecurity practices used by red teams and defenders to test real-world ...

16:21
Adversary Emulation Explained | Cybersecurity Red Teaming vs Simulation

27 views

4 months ago

Tech with Gerard
The adversary emulation tool YOU NEED to know about!

The Adversary Emulation tool you need to know! Honestly, if you are in Cybersecurity this is a tool you need to download and play ...

13:38
The adversary emulation tool YOU NEED to know about!

6,834 views

1 year ago

ThinkInfoSec with Andre Camillo
Automating Adversary Emulation with MITRE Caldera

MITRE CALDERA is a Breach Attack Simulation (BAS) tool for automated and scalable red/blue team operations. Let's have a ...

19:44
Automating Adversary Emulation with MITRE Caldera

15,427 views

2 years ago

Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development

TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development Info: https://github.com/fozavci/ta505plus.

11:15
TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development

485 views

5 years ago

Mohamed M. Fouad
APT 28 Adversary Simulation

APT 28 Adversary Simulation.

8:56
APT 28 Adversary Simulation

292 views

2 years ago

psychsec
Adversary simulation in modern environments
19:43
Adversary simulation in modern environments

505 views

4 years ago

Fatih Ozavci
TA505+ Adversary Simulation:  Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter

TA505+ Adversary Simulation: Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter Info: ...

16:40
TA505+ Adversary Simulation: Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter

71 views

5 years ago

sandeep ganga
Adversary simulation tools
13:34
Adversary simulation tools

26 views

3 years ago

AttackIQ
Intelligence Driven Threat Hunting with Adversary Simulation and Purple Teaming

Threat hunting is an important supplemental part of normal security operations and focuses on the proactive detection of threats ...

18:12
Intelligence Driven Threat Hunting with Adversary Simulation and Purple Teaming

199 views

2 years ago

Fatih Ozavci
TA505+ Adversary Simulation: Exploitation - 1 Restriction Escape   Persistency and UAC Bypass

TA505+ Adversary Simulation: Exploitation - 1 Restriction Escape Persistency and UAC Bypass Info: ...

12:06
TA505+ Adversary Simulation: Exploitation - 1 Restriction Escape Persistency and UAC Bypass

103 views

5 years ago

Fatih Ozavci
TA505+ Adversary Simulation: Delivery - 2 Nested Implants

TA505+ Adversary Simulation: Execution Nested Implants Info: https://github.com/fozavci/ta505plus.

8:35
TA505+ Adversary Simulation: Delivery - 2 Nested Implants

58 views

5 years ago

Fatih Ozavci
TA505+ Adversary Simulation: AoO - 8 Linux Ircd Exploitation and Docker Privilege Escalation

TA505+ Adversary Simulation: Actions on Objectives - 8 Linux Ircd Exploitation and Docker Privilege Escalation Info: ...

6:14
TA505+ Adversary Simulation: AoO - 8 Linux Ircd Exploitation and Docker Privilege Escalation

35 views

5 years ago

Fatih Ozavci
TA505+ Adversary Simulation: AoO - 2 Ransomware Simulation

TA505+ Adversary Simulation: AoO - 2 Ransomware Simulation Info: https://github.com/fozavci/ta505plus.

9:40
TA505+ Adversary Simulation: AoO - 2 Ransomware Simulation

78 views

5 years ago

Fatih Ozavci
TA505+ Adversary Simulation:  Weaponisation - 4 Petaq Implant and Service Demonstration

TA505+ Adversary Simulation: Weaponisation - 4 Petaq Implant and Service Demonstration Info: ...

11:18
TA505+ Adversary Simulation: Weaponisation - 4 Petaq Implant and Service Demonstration

99 views

5 years ago

Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 2 Petaq AMSI Bypass

TA505+ Adversary Simulation: Weaponisation - 2 Petaq AMSI Bypass Info: https://github.com/fozavci/ta505plus.

18:07
TA505+ Adversary Simulation: Weaponisation - 2 Petaq AMSI Bypass

262 views

5 years ago

CodeLines
Adversary simulation vs adversary emulation explained

Download 1M+ code from https://codegive.com/44eaf25 okay, let's dive into the world of adversary simulation and adversary ...

13:35
Adversary simulation vs adversary emulation explained

5 views

9 months ago

Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 6 Petaq UAC Bypass and Running Meterpreter

TA505+ Adversary Simulation: Weaponisation - 6 Petaq UAC Bypass and Running Meterpreter Info: ...

12:23
TA505+ Adversary Simulation: Weaponisation - 6 Petaq UAC Bypass and Running Meterpreter

103 views

5 years ago

Fatih Ozavci
Practical Automated Adversary Simulation Using Petaq C2 (AusCERT 2020 Demo)

This video is extracted from my AusCERT 2020 talk Designing, Developing and Running Purple Teaming Exercises. The reason ...

9:41
Practical Automated Adversary Simulation Using Petaq C2 (AusCERT 2020 Demo)

155 views

5 years ago

Mauricio Velazco
Active Directory Adversary Simulation with PurpleSharp : Discovery - TA0007

In this video we leverage PurpleSharp to execute 3 adversary simulation playbooks in an Active Directory environment within the ...

7:25
Active Directory Adversary Simulation with PurpleSharp : Discovery - TA0007

523 views

4 years ago