eastmountyxz / PowershellDetectLinks
该资源详细介绍Powershell脚本混淆、解混淆、抽象语法树提取、token提取、恶意性检测等内容,希望对您有所帮助!
☆21Updated 3 years ago
Alternatives and similar repositories for PowershellDetect
Users that are interested in PowershellDetect are comparing it to the libraries listed below
Sorting:
- 感染PE文件的病毒学习过程☆32Updated 4 years ago
- 分析cobaltstrike c2 协议☆68Updated 5 years ago
- CobaltStrikeDetect☆49Updated 4 months ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆74Updated 2 years ago
- ☆32Updated 5 years ago
- 该资源主要是作者翻译各大安全厂商的APT报告,希望对您有所帮助。☆20Updated 4 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 3 years ago
- PE学习 小工具,它的作用就是将32位的PE文件的按内存对齐,然后合并所有节,接着新增一个节存放Shellcode,将程序入口位置修改到Shellcode的位置。☆19Updated 3 years ago
- 企业级安全智能化实践☆69Updated 3 years ago
- 基于行为特征进行快速匹配病毒专杀工具,辅助应急响应☆37Updated 5 years ago
- ☆11Updated 5 years ago
- SysEye是一个window上的基于att&ck现代EDR设计思想的威胁响应工具.有效检测常见的未知威胁与已知威胁.防守方的利剑☆63Updated 3 years ago
- slides and papers from (or partly from) Bonan☆22Updated last year
- 17条检测cobaltstrike的suricata-ids规则☆67Updated 3 years ago
- 一款http协议的漏洞扫描框架☆27Updated 5 years ago
- ☆37Updated 5 years ago
- 机器学习检测webshell☆68Updated 4 years ago
- NextB的恶意邮件识别项目☆30Updated 2 years ago
- Dependencies with Log4j2 Checklist☆35Updated 3 years ago
- check cs yara rules☆42Updated 4 years ago
- 基于卷积神经网络的WebShell检测工具,可以检测JSP和PHP类型文件,以opcode和bytecode作为检测特征,基于Django框架☆17Updated 4 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Updated 4 years ago
- 利用github action定时爬取先知、安全客等的文章进行保存☆65Updated 3 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 3 years ago
- 恶意软件原理图☆59Updated 4 years ago
- CVE-2021-36798: CobaltStrike < 4.4 Dos☆103Updated 4 years ago
- 对恶意流量分析的练习☆26Updated 3 years ago
- Godzilla v1.0 source code☆38Updated 5 years ago
- ☆83Updated 3 years ago
- Apache/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Diffe…☆52Updated 4 years ago