A repo to document API functions mapped to security events across diverse platforms
☆74Nov 1, 2019Updated 6 years ago
Alternatives and similar repositories for API-To-Event
Users that are interested in API-To-Event are comparing it to the libraries listed below
Sorting:
- SilkETW & SilkService☆40Aug 14, 2019Updated 6 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆95Feb 2, 2022Updated 4 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- ☆18May 3, 2021Updated 4 years ago
- Python module for running BOFs☆79Nov 28, 2025Updated 3 months ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Mar 31, 2018Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆193Sep 29, 2021Updated 4 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ☆261May 9, 2024Updated last year
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- PoC for proxying COM objects when hijacking☆214Sep 10, 2019Updated 6 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 2 months ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆730Jan 21, 2020Updated 6 years ago
- Encyclopedia for Executables☆471Nov 9, 2021Updated 4 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆402Feb 27, 2024Updated 2 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago