jsecurity101 / PowerParse
PowerShell PE Parser
☆62Updated 9 months ago
Alternatives and similar repositories for PowerParse:
Users that are interested in PowerParse are comparing it to the libraries listed below
- a tiny program to consume from ETW providers for research☆47Updated 3 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 5 months ago
- ☆105Updated 5 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆36Updated 2 months ago
- ☆20Updated last year
- ☆45Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- ☆156Updated 11 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆40Updated 7 months ago
- quASAR: ASAR manipulation made easy☆37Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Analyse MSI files for vulnerabilities☆129Updated 7 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆35Updated 3 months ago
- Utilities for obfuscating shellcode☆59Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- ☆69Updated last year
- ☆72Updated 8 months ago
- ☆46Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆27Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Code samples that serve as references for Windows API functions☆30Updated 10 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Repo containing my public talks☆23Updated last year
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Yara Rules for Modern Malware☆77Updated last year
- ☆40Updated last year