SafeBreach-Labs / aikido_wiper
☆66Updated 2 years ago
Alternatives and similar repositories for aikido_wiper
Users that are interested in aikido_wiper are comparing it to the libraries listed below
Sorting:
- Default Detections for EDR☆96Updated last year
- ☆82Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆61Updated 5 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 7 months ago
- Detect WFP filters blocking EDR communications☆86Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 8 months ago
- ☆25Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- ☆76Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆93Updated 2 years ago
- Finding secrets in kernel and user memory☆115Updated last year
- a tiny program to consume from ETW providers for research☆48Updated 4 months ago
- ☆80Updated 5 months ago
- Linux #rootkit and #malware revealer☆26Updated 9 months ago
- ☆37Updated last year
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆32Updated 6 months ago
- create a "simulated internet" cyber range environment☆16Updated 2 weeks ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆20Updated last year
- A collection of tools, scripts and personal research☆128Updated last month
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆91Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 11 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆35Updated 4 months ago
- BloodHound PowerShell client☆53Updated last month
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated 10 months ago
- ☆117Updated 4 years ago