secabstraction / PowerWalker
☆21Updated 9 years ago
Alternatives and similar repositories for PowerWalker:
Users that are interested in PowerWalker are comparing it to the libraries listed below
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- ☆16Updated 7 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Updated 5 years ago
- Random Code Store☆17Updated 2 years ago
- ☆52Updated 6 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆21Updated 8 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 4 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 8 years ago
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- ☆63Updated 8 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- PowerShell Module for the Antimalware Scan Interface (AMSI)☆25Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 6 months ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- MALM: Malware Monitor☆49Updated 11 years ago
- Summit Route End Point Protection - Server code☆12Updated 9 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- ☆22Updated 7 years ago
- ☆33Updated 7 years ago
- ☆18Updated 7 years ago
- Network detector for Winnti malware☆20Updated 7 years ago