danielbohannon / Revoke-ObfuscationLinks
PowerShell Obfuscation Detection Framework
☆740Updated last year
Alternatives and similar repositories for Revoke-Obfuscation
Users that are interested in Revoke-Obfuscation are comparing it to the libraries listed below
Sorting:
- PowerShell script for deobfuscating encoded PowerShell scripts☆425Updated 4 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆822Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆841Updated 7 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆655Updated 5 years ago
- Executes PowerShell from an unmanaged process☆499Updated 9 years ago
- ☆427Updated 2 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆487Updated 8 years ago
- Random Tools☆842Updated 2 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆472Updated 4 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 3 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆899Updated 7 years ago
- ☆778Updated 2 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆815Updated 5 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆369Updated 6 years ago
- PowerShell Module with Security cmdlets for security work☆447Updated 5 years ago
- PowerShell Scripts I find useful☆751Updated 9 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆877Updated 3 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆809Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Updated 8 years ago
- Tool Analysis Result Sheet☆355Updated 7 years ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 3 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,411Updated last year
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Updated 6 years ago
- Exploit the credentials present in files and memory☆843Updated 2 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆922Updated last year
- ☆1,081Updated 6 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,613Updated 6 years ago
- random powershell goodness☆455Updated 8 months ago