SentineLabs / PowerTrickLinks
This is a repository for the public blog with Labs indicators of compromise and code
☆18Updated 5 years ago
Alternatives and similar repositories for PowerTrick
Users that are interested in PowerTrick are comparing it to the libraries listed below
Sorting:
- C# User Simulation☆33Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- ☆23Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 4 years ago
- A set of tools for collecting forensic information☆27Updated 5 years ago
- ☆22Updated 4 years ago
- OSSEM Modular☆27Updated 5 years ago
- ☆38Updated 3 years ago
- ☆15Updated 4 years ago
- ☆11Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 8 months ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- ☆12Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- ☆36Updated 2 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- Microsoft Flow Attack Framework☆23Updated 6 years ago