jsecurity101 / JonMon
☆206Updated 3 weeks ago
Alternatives and similar repositories for JonMon:
Users that are interested in JonMon are comparing it to the libraries listed below
- ☆232Updated 9 months ago
- ☆154Updated 9 months ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- ☆199Updated 3 months ago
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- A collection of tools, scripts and personal research☆125Updated 7 months ago
- Tools for analyzing EDR agents☆220Updated 8 months ago
- Active C&C Detector☆152Updated last year
- Repository of Yara Rules☆100Updated this week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 5 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆118Updated 3 weeks ago
- Elastic Security Labs releases☆57Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆192Updated 2 weeks ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆306Updated last year
- ☆111Updated this week
- Rules shared by the community from 100 Days of YARA 2024☆83Updated last month
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆169Updated 2 years ago
- ☆214Updated 2 years ago
- ☆142Updated 3 weeks ago
- ☆187Updated 2 years ago
- ☆296Updated 3 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆134Updated 7 months ago
- ☆25Updated 2 years ago
- ☆80Updated 3 months ago
- Abusing Intune for Lateral Movement over C2☆325Updated last week
- Find potential DLL Sideloads on your windows computer☆175Updated last month
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- A specification and style guide for YARA rules☆45Updated last year
- Yara Rules for Modern Malware☆73Updated 11 months ago