secabstraction / PowerWalker
☆21Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for PowerWalker
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆30Updated 4 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆20Updated 7 years ago
- ☆16Updated 7 years ago
- Random Code Store☆17Updated last year
- A PowerShell binding for the Unicorn Engine☆16Updated 8 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Evil Reflective DLL Injection Finder☆45Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆39Updated 4 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated last month
- Generate RSA keys, encrypt and decrypt data☆24Updated 3 years ago
- DotNext 2019 St. Petersburg Talk Demos☆36Updated 5 years ago
- Post-explotation Hacks☆14Updated 5 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Summit Route End Point Protection - Server code☆12Updated 8 years ago
- MALM: Malware Monitor☆45Updated 11 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Network detector for Winnti malware☆20Updated 6 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- ☆33Updated 7 years ago
- ☆51Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆28Updated 4 years ago