SafeBreach-Labs / aikido_wiper
☆64Updated last year
Related projects ⓘ
Alternatives and complementary repositories for aikido_wiper
- Default Detections for EDR☆94Updated 9 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- ☆76Updated 6 months ago
- Detect WFP filters blocking EDR communications☆81Updated 10 months ago
- ☆68Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- ☆80Updated 2 years ago
- ☆129Updated last month
- ☆36Updated 7 months ago
- A collection of tools, scripts and personal research☆113Updated 4 months ago
- ☆105Updated 9 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 7 months ago
- Yara Rules for Modern Malware☆67Updated 8 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- DEFCON30 Talk Material, References and Extra Bits☆36Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- ☆173Updated 3 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆30Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆30Updated 5 months ago
- A C# based tool for analysing malicious OneNote documents☆107Updated last year
- Analyse MSI files for vulnerabilities☆109Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 6 months ago
- ☆109Updated 3 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ☆20Updated 11 months ago
- Finding secrets in kernel and user memory☆113Updated last year
- ☆67Updated 3 months ago