# Implementation
- [AppliedPurpleTeaming/APT-9S22: APT-9S22](https://github.com/AppliedPurpleTeaming/APT-9S22)
- [https://github.com/DefensiveOrigins/APT-PreReqs](https://github.com/DefensiveOrigins/APT-PreReqs)
# Related Videos
- [Honey Users for Cybersecurity | John Strand | BHIS Nuggets - YouTube](https://www.youtube.com/watch?v=nAYHfD7BD7k&list=PLAo444udA0qxffV2D4sKR3Ku3DLALzJj3&index=10&t=146s)
- [Trick Hackers with a Fake User - YouTube](https://www.youtube.com/watch?v=cwaJznO_g2U&list=PLAo444udA0qxffV2D4sKR3Ku3DLALzJj3&index=11&t=97s)
- [BadBlood - Detection Lab - YouTube](https://www.youtube.com/watch?v=5tuDpH9UCOE)
- [Introduction :: DetectionLab](https://detectionlab.network/)
- [clong/DetectionLab: Automate the creation of a lab environment complete with security tooling and logging best practices](https://github.com/clong/DetectionLab)
- [Active Directory Enumeration With BloodHound - YouTube](https://www.youtube.com/watch?v=sGO4F23Xik4)
- [GraphRunner: A Post-Exploitation Toolset for M365 | Beau & Steve - YouTube](https://www.youtube.com/watch?v=o29jzC3deS0&t=836s)
-