mandiant / SilkETW
☆752Updated last year
Alternatives and similar repositories for SilkETW:
Users that are interested in SilkETW are comparing it to the libraries listed below
- ☆465Updated last year
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆794Updated 2 months ago
- PowerShell Obfuscation Detection Framework☆729Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 9 months ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆424Updated 4 years ago
- ☆492Updated 2 months ago
- Event Tracing For Windows (ETW) Resources☆362Updated 4 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆486Updated 2 years ago
- Evade sysmon and windows event logging☆614Updated 4 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆498Updated 3 years ago
- Executes PowerShell from an unmanaged process☆481Updated 8 years ago
- Tool Analysis Result Sheet☆347Updated 7 years ago
- C# based evtx parser with lots of extras☆289Updated 2 weeks ago
- ☆422Updated last year
- Also known by Microsoft as Knifecoat☆1,123Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,123Updated last year
- View ETW Provider manifest☆455Updated 3 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆910Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆826Updated 6 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆286Updated 9 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆731Updated 11 months ago
- Utilities for Sysmon☆1,501Updated 8 months ago
- An Active Defense and EDR software to empower Blue Teams☆1,255Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,509Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆907Updated 3 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆419Updated last year
- Repository of YARA rules made by Trellix ATR Team☆576Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆566Updated 2 weeks ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆515Updated 3 years ago