SafeBreach-Labs / aikido_wiper
☆66Updated 2 years ago
Alternatives and similar repositories for aikido_wiper:
Users that are interested in aikido_wiper are comparing it to the libraries listed below
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆40Updated 7 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- Detect WFP filters blocking EDR communications☆86Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Abuse Azure API permissions for red teaming☆66Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- ☆82Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- ☆37Updated last year
- ☆80Updated 5 months ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆38Updated 2 years ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 3 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆40Updated last year
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 5 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 2 years ago
- Utilities for obfuscating shellcode☆59Updated last month
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆38Updated 2 years ago
- ☆27Updated 5 months ago
- create a "simulated internet" cyber range environment☆16Updated last month
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆35Updated 3 months ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆61Updated 4 months ago
- ☆117Updated last year
- Living Off the Foreign Land setup scripts☆67Updated 2 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆36Updated last year
- Default Detections for EDR☆96Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 10 months ago