mandiant / SilkETWLinks
☆816Updated 2 years ago
Alternatives and similar repositories for SilkETW
Users that are interested in SilkETW are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscation Detection Framework☆750Updated 2 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆842Updated last year
- PowerShell script for deobfuscating encoded PowerShell scripts☆431Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year
- ☆531Updated 7 months ago
- View ETW Provider manifest☆564Updated last year
- Detect and respond to Cobalt Strike beacons using ETW.☆515Updated 3 years ago
- ☆431Updated 2 years ago
- ☆480Updated 2 years ago
- Event Tracing For Windows (ETW) Resources☆409Updated 2 months ago
- All sysmon event types and their fields explained☆564Updated 4 years ago
- C# based evtx parser with lots of extras☆340Updated 4 months ago
- Evade sysmon and windows event logging☆625Updated 5 years ago
- Executes PowerShell from an unmanaged process☆517Updated 9 years ago
- A wireshark plugin to instrument ETW☆577Updated 3 years ago
- Tool Analysis Result Sheet☆356Updated 8 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆429Updated 2 years ago
- Utilities for Sysmon☆1,564Updated 3 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆722Updated 3 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆529Updated 4 years ago
- Live hunting of code injection techniques☆385Updated 6 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆934Updated 2 years ago
- Open Source EDR for Windows☆1,289Updated 2 years ago
- ☆1,124Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 3 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆816Updated 2 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,342Updated 3 weeks ago
- Also known by Microsoft as Knifecoat☆1,147Updated 3 years ago
- Encyclopedia for Executables☆465Updated 4 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆852Updated 7 years ago