jsecurity101 / ETWInspector
☆153Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for ETWInspector
- ☆173Updated 4 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆111Updated 4 months ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆163Updated last year
- ETW based POC to identify direct and indirect syscalls☆174Updated last year
- Tools for analyzing EDR agents☆209Updated 5 months ago
- ☆98Updated 3 weeks ago
- Detect EDR's exceptions by inspecting processes' loaded modules☆123Updated 8 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆95Updated 7 months ago
- ☆111Updated 2 weeks ago
- ☆95Updated 2 months ago
- EDRSandblast-GodFault☆240Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆72Updated 2 months ago
- Collect Windows telemetry for Maldev☆62Updated this week
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆115Updated 2 years ago
- ☆68Updated 3 months ago
- ☆133Updated last year
- ☆105Updated 9 months ago
- ☆211Updated last year
- Exploitation of process killer drivers☆188Updated last year
- Admin to Kernel code execution using the KSecDD driver☆238Updated 7 months ago
- Execute PowerShell code at the antimalware-light protection level.☆138Updated last year
- ☆129Updated last month
- A Mythic Agent written in PIC C.☆92Updated this week
- ☆106Updated last year
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆104Updated 2 months ago
- Experiment on reproducing Obfuscate & Sleep☆139Updated 3 years ago
- Powershell Linter☆46Updated 2 months ago
- ☆103Updated 4 months ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆325Updated 5 months ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆183Updated 2 years ago