ProcessusT / ETWMonitorLinks
Windows notifier tool that detects suspicious connections by monitoring ETW event logs
☆120Updated 2 years ago
Alternatives and similar repositories for ETWMonitor
Users that are interested in ETWMonitor are comparing it to the libraries listed below
Sorting:
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆229Updated 3 years ago
- Collection of scripts to retrieve stored passwords from Veeam Backup☆140Updated 6 months ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.☆140Updated last year
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆223Updated 2 years ago
- Deleting Shadow Copies In Pure C++☆116Updated 3 years ago
- Default Detections for EDR☆96Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Microsoft Signed PowerShell scripts☆219Updated 2 years ago
- ☆302Updated last year
- ☆68Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Updated 3 years ago
- ☆120Updated last year
- Spoofing desktop login applications with WinForms and WPF☆177Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 2 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆93Updated 3 years ago
- ☆84Updated 3 years ago
- Ransomware simulator written in C#☆37Updated 3 years ago
- ☆107Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146Updated last year
- Create and enumerate hidden desktops.☆88Updated last year
- ☆167Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- ☆163Updated 5 months ago