mandiant / SilkETW
☆762Updated last year
Alternatives and similar repositories for SilkETW:
Users that are interested in SilkETW are comparing it to the libraries listed below
- PowerShell Obfuscation Detection Framework☆734Updated last year
- PowerShell script for deobfuscating encoded PowerShell scripts☆425Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated 11 months ago
- ☆429Updated last year
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆800Updated 4 months ago
- ☆469Updated last year
- Event Tracing For Windows (ETW) Resources☆374Updated 6 months ago
- View ETW Provider manifest☆478Updated 5 months ago
- ☆511Updated 4 months ago
- Tool Analysis Result Sheet☆348Updated 7 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆917Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆833Updated 7 years ago
- Remote Command Executor: A OSS replacement for PsExec and RunAs - or Telnet without having to install a server. Take your pick :)☆343Updated 7 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆502Updated 4 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆294Updated 11 months ago
- ☆484Updated 7 years ago
- A wireshark plugin to instrument ETW☆555Updated 3 years ago
- C# based evtx parser with lots of extras☆299Updated 3 weeks ago
- Executes PowerShell from an unmanaged process☆487Updated 9 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆800Updated last year
- Live hunting of code injection techniques☆380Updated 5 years ago
- ☆1,050Updated last year
- ☆2,071Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,140Updated 4 years ago
- All sysmon event types and their fields explained☆547Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆592Updated last month
- Utilities for Sysmon☆1,513Updated last month
- Enumerate and disable common sources of telemetry used by AV/EDR.☆790Updated 4 years ago