Abdelrahme / WinLogHuntLinks
☆18Updated 2 weeks ago
Alternatives and similar repositories for WinLogHunt
Users that are interested in WinLogHunt are comparing it to the libraries listed below
Sorting:
- ☆30Updated last week
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆45Updated 2 months ago
- ☆45Updated last year
- ☆18Updated 10 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- ☆23Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆42Updated 11 months ago
- ☆21Updated last year
- Just another Process Injection using Process Hollowing technique.☆18Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A pure C version of SymProcAddress☆29Updated last year
- Ghosting-AMSI☆17Updated 4 months ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆28Updated 7 months ago
- ☆74Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆15Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated 2 years ago
- ☆25Updated 7 months ago
- Self Delete DLL☆23Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆44Updated last year
- An example of COM hijacking using a proxy DLL.☆38Updated 4 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆40Updated 2 years ago
- example using NtCreateUserProcess in rust☆19Updated 7 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated last year
- ☆37Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago