XForceIR / SideLoadHunterLinks
☆26Updated 3 years ago
Alternatives and similar repositories for SideLoadHunter
Users that are interested in SideLoadHunter are comparing it to the libraries listed below
Sorting:
- Active C&C Detector☆156Updated 2 years ago
- ☆256Updated last year
- A collection of tools, scripts and personal research☆146Updated 4 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆84Updated 2 months ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- Initial triage of Windows Event logs☆103Updated last year
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆251Updated 2 months ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆158Updated 2 years ago
- PowerShell tool to triage systems☆12Updated 2 years ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆73Updated last month
- ☆205Updated last month
- ☆163Updated 5 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆139Updated 3 weeks ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated last month
- Baseline a Windows System against LOLBAS☆69Updated last year
- ☆245Updated 6 months ago
- The home of the SDDLMaker☆27Updated 10 months ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆34Updated last month
- MITRE ATT&CK mapped queries for SentinelOne Deep Visiblity☆92Updated 4 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Yara Rules for Modern Malware☆78Updated last year
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Updated 5 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- Full of public notes and Utilities☆129Updated 9 months ago
- ☆53Updated 3 weeks ago