SentineLabs / PowerTrickLinks
This is a repository for the public blog with Labs indicators of compromise and code
☆18Updated 5 years ago
Alternatives and similar repositories for PowerTrick
Users that are interested in PowerTrick are comparing it to the libraries listed below
Sorting:
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- OSSEM Modular☆27Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- ☆15Updated 3 years ago
- ☆38Updated 3 years ago
- C# User Simulation☆33Updated 2 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- Win32 utility for auditing TCP connections☆56Updated 5 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 6 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Standardized Malware Analysis Tool☆55Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 6 years ago
- ☆46Updated 2 years ago
- BloodHound Data Scanner☆45Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 8 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- ☆22Updated 4 years ago
- ☆12Updated 4 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago
- ☆23Updated 5 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- ☆11Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆36Updated 2 years ago