mtth-bfft / evtqLinks
Windows eventlog formatting, live fetching and querying utility in C
☆20Updated 5 years ago
Alternatives and similar repositories for evtq
Users that are interested in evtq are comparing it to the libraries listed below
Sorting:
- ☆36Updated last year
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- MiniDump a process in memory with rust☆36Updated 4 years ago
- AD Live changes viewer☆36Updated 2 years ago
- A technique for Active Directory domain persistence☆39Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Donut generator in rust.☆27Updated 3 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆9Updated 2 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 6 months ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 5 months ago
- A tool to abuse Exchange services☆11Updated last year
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Updated 4 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- ☆45Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆36Updated 2 weeks ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- The hidden mstsc recorder player☆29Updated 5 years ago
- Repository for dirty scripts and PoCs☆18Updated 4 months ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Tool to manage user privileges☆29Updated 5 years ago
- Understanding the operation and limitations of Sysmon's events☆19Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆61Updated 2 years ago
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Updated 3 years ago
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆30Updated 2 years ago