danielbohannon / Revoke-ObfuscationLinks
PowerShell Obfuscation Detection Framework
☆736Updated last year
Alternatives and similar repositories for Revoke-Obfuscation
Users that are interested in Revoke-Obfuscation are comparing it to the libraries listed below
Sorting:
- PowerShell Remote Download Cradle Generator & Obfuscator☆837Updated 7 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆424Updated 4 years ago
- Executes PowerShell from an unmanaged process☆489Updated 9 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆815Updated 11 months ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆883Updated 7 years ago
- ☆428Updated 2 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆653Updated 5 years ago
- ☆770Updated 2 years ago
- Not PowerShell☆446Updated 8 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆918Updated last year
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆468Updated 4 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆511Updated 2 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,539Updated 5 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆369Updated 6 years ago
- Tool Analysis Result Sheet☆354Updated 7 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆486Updated 7 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,606Updated 6 years ago
- PowerShell Scripts I find useful☆752Updated 9 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Updated 7 years ago
- ☆276Updated 2 years ago
- Random Tools☆839Updated 2 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆803Updated last year
- PowerShell Pass The Hash Utils☆1,593Updated 6 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,800Updated 4 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,130Updated 4 years ago
- Utilities for Sysmon☆1,527Updated 3 months ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,401Updated last year
- Windows Event Log Killer☆1,787Updated last year
- ☆1,075Updated 6 years ago