XForceIR / SideLoadHunterLinks
☆26Updated 3 years ago
Alternatives and similar repositories for SideLoadHunter
Users that are interested in SideLoadHunter are comparing it to the libraries listed below
Sorting:
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Active C&C Detector☆156Updated 2 years ago
- A collection of tools, scripts and personal research☆146Updated 3 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last week
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆73Updated last week
- Baseline a Windows System against LOLBAS☆69Updated last year
- ☆255Updated last year
- The home of the SDDLMaker☆27Updated 10 months ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆249Updated last month
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆158Updated 2 years ago
- Initial triage of Windows Event logs☆103Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆82Updated last month
- custom Python script to perform Yara matching in Cortex XDR☆14Updated 4 years ago
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- ☆244Updated 5 months ago
- Yara Rules for Modern Malware☆78Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- My Notes from Hugging Face AI Agents Course☆19Updated 9 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Updated 5 months ago
- Default Detections for EDR☆96Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆133Updated 3 weeks ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆34Updated 3 weeks ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- ☆52Updated this week
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆37Updated 2 months ago
- PowerShell tool to triage systems☆12Updated 2 years ago
- ☆53Updated last month