SafeBreach-Labs / aikido_wiperLinks
☆68Updated 3 years ago
Alternatives and similar repositories for aikido_wiper
Users that are interested in aikido_wiper are comparing it to the libraries listed below
Sorting:
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- ☆86Updated 3 years ago
- ☆120Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- ☆132Updated 2 years ago
- ☆84Updated last year
- Detect WFP filters blocking EDR communications☆95Updated last year
- ☆76Updated 3 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Updated 2 years ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated last week
- ☆70Updated 2 years ago
- Yara Rules for Modern Malware☆78Updated last year
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- ☆122Updated 4 years ago
- Golang bindings for PE-sieve☆42Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago
- ☆45Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- ☆77Updated last year
- Execute PowerShell code at the antimalware-light protection level.☆141Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- ☆107Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆91Updated 3 years ago