SafeBreach-Labs / aikido_wiperLinks
☆67Updated 2 years ago
Alternatives and similar repositories for aikido_wiper
Users that are interested in aikido_wiper are comparing it to the libraries listed below
Sorting:
- Detect WFP filters blocking EDR communications☆91Updated last year
- Default Detections for EDR☆96Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆80Updated 9 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- a tiny program to consume from ETW providers for research☆49Updated 5 months ago
- ☆81Updated 7 months ago
- ☆151Updated 5 months ago
- ☆24Updated 4 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- ☆83Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- ☆75Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆93Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆94Updated 2 years ago
- Yara Rules for Modern Malware☆77Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year
- ☆69Updated last year
- A collection of tools, scripts and personal research☆133Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- ☆25Updated 2 years ago
- BloodHound PowerShell client☆56Updated 2 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆91Updated 2 years ago
- Living Off the Foreign Land setup scripts☆70Updated 4 months ago
- ☆119Updated last year
- ☆145Updated last week
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆29Updated last year
- ☆45Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year