palantir / exploitguard
Documentation and supporting script sample for Windows Exploit Guard
☆156Updated 3 years ago
Alternatives and similar repositories for exploitguard
Users that are interested in exploitguard are comparing it to the libraries listed below
Sorting:
- A repository that maps API calls to Sysmon Event ID's.☆120Updated 2 years ago
- FLARE Kernel Shellcode Loader☆177Updated 6 years ago
- Neutering Sysmon via driver unload☆228Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆109Updated 6 years ago
- Pure Python parser for Application Compatibility Shim Databases (.sdb files)☆108Updated 4 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- ☆67Updated 2 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆151Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- ☆216Updated 7 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆214Updated 5 years ago
- Static based decoders for malware samples☆93Updated 4 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- A tool for de-obfuscating PowerShell scripts☆68Updated 6 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆95Updated 7 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Updated 7 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- Scripts for performing and detecting parent PID spoofing☆146Updated 4 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆157Updated 5 years ago
- Presentation material presented by Outflank team members at public events.☆187Updated 5 months ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Windows Drivers☆98Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆136Updated 7 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- Process reimaging proof of concept code☆96Updated 5 years ago
- ☆229Updated 7 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆297Updated last year