SafeBreach-Labs / aikido_wiperLinks
☆68Updated 3 years ago
Alternatives and similar repositories for aikido_wiper
Users that are interested in aikido_wiper are comparing it to the libraries listed below
Sorting:
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Default Detections for EDR☆97Updated last year
- ☆86Updated 3 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- a tiny program to consume from ETW providers for research☆53Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 10 months ago
- ☆84Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- ☆76Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Detect WFP filters blocking EDR communications☆96Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated last year
- ☆121Updated last year
- ☆27Updated last year
- ☆38Updated 2 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Yara Rules for Modern Malware☆78Updated last year
- Baseline a Windows System against LOLBAS☆69Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated last month
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- Execute PowerShell code at the antimalware-light protection level.☆142Updated 3 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated last year
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago