secabstraction / PowerWalkerLinks
☆21Updated 9 years ago
Alternatives and similar repositories for PowerWalker
Users that are interested in PowerWalker are comparing it to the libraries listed below
Sorting:
- EventList - the Baseline Event Analyzer☆11Updated 6 years ago
- ☆16Updated 7 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆21Updated 8 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- Evil Reflective DLL Injection Finder☆47Updated 6 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 9 years ago
- Random Code Store☆17Updated 2 years ago
- ☆52Updated 6 years ago
- ☆22Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Updated 5 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- RegRipper wrapper for simplified bulk parsing or registry hives☆9Updated 6 years ago
- ☆22Updated 4 years ago
- ☆10Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- ☆18Updated 7 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago