SafeBreach-Labs / aikido_wiperLinks
☆69Updated 2 years ago
Alternatives and similar repositories for aikido_wiper
Users that are interested in aikido_wiper are comparing it to the libraries listed below
Sorting:
- ☆82Updated 11 months ago
- Finding secrets in kernel and user memory☆115Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- ☆85Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- ☆119Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 2 months ago
- Detect WFP filters blocking EDR communications☆94Updated last year
- ☆132Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- ☆39Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 3 months ago
- ☆74Updated 3 years ago
- ☆70Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆117Updated 2 years ago
- Yara Rules for Modern Malware☆79Updated last year
- ☆84Updated 3 years ago
- a tiny program to consume from ETW providers for research☆52Updated 9 months ago
- create a "simulated internet" cyber range environment☆18Updated 5 months ago
- Windows APT Warfare, published by Packt☆76Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- ☆120Updated 4 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆43Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year