nmantani / PS-MOTWLinks
PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)
☆48Updated 2 years ago
Alternatives and similar repositories for PS-MOTW
Users that are interested in PS-MOTW are comparing it to the libraries listed below
Sorting:
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- ☆77Updated last year
- ACL Viewer for Windows☆132Updated 6 months ago
- ☆31Updated 11 months ago
- ☆29Updated last year
- a tiny program to consume from ETW providers for research☆53Updated 10 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- Mentally ill EtwTi parser☆66Updated last month
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆46Updated 2 years ago
- ☆108Updated last year
- Demoting PPL anti-malware services to less than a guest user☆64Updated 9 months ago
- ☆34Updated 2 years ago
- Parse SDDL strings☆36Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- EvtPsst☆55Updated 2 years ago
- use python on windows with full submodule support without installation☆30Updated 9 months ago
- ☆38Updated 7 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆129Updated 3 weeks ago
- macOS dylib stager☆36Updated 9 months ago
- Test AMSI Provider implementation in C#☆42Updated 11 months ago
- A Payload Analysis Framework☆110Updated last month
- Slides and resources from MCTTP 2025 Talk☆66Updated 3 weeks ago
- ☆47Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Updated last year
- List the ETW provider(s) in the registration table of a process.☆63Updated 2 years ago
- "Service-less" driver loading☆162Updated 11 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆31Updated 7 months ago
- ☆62Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year