CsaProtocol / PowerShell-FIMLinks
File integrity monitor proof-of-concept in PowerShell sends a message via Telegram when it detects changes to a specified directory. It continually checks for changes by generating hashes for all files and comparing them to a stored baseline. Uses Telegram API and allows choice of hash algorithm.
☆11Updated 2 years ago
Alternatives and similar repositories for PowerShell-FIM
Users that are interested in PowerShell-FIM are comparing it to the libraries listed below
Sorting:
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Automated Malware Behavior Analysis Tool☆11Updated last month
- Tool for obtaining information about PPL processes☆17Updated last year
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Updated 3 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆14Updated 3 years ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14Updated last year
- ☆18Updated last year
- Cmdlets for capturing Windows Events☆14Updated 3 years ago
- ☆27Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 10 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆28Updated last year
- ☆18Updated 4 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 11 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago