Abdelrahme / WinLogHuntLinks
☆21Updated 2 months ago
Alternatives and similar repositories for WinLogHunt
Users that are interested in WinLogHunt are comparing it to the libraries listed below
Sorting:
- ☆47Updated 5 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆30Updated 9 months ago
- ☆45Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- ☆30Updated 2 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆23Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- Detonate malware on VMs and get logs & detection status☆60Updated last week
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆50Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- ☆18Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Updated last year
- Ghosting-AMSI☆18Updated 6 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆45Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- example using NtCreateUserProcess in rust☆19Updated 9 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆40Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated 2 years ago
- ☆41Updated last year
- ☆20Updated 2 years ago
- ☆74Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆29Updated last year
- ☆58Updated last year
- Modify managed functions from unmanaged code☆52Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- ☆24Updated 9 months ago