secabstraction / PowerWalker
☆21Updated 8 years ago
Alternatives and similar repositories for PowerWalker:
Users that are interested in PowerWalker are comparing it to the libraries listed below
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- ☆16Updated 7 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Updated 5 years ago
- Sample libraries to be used with IAT Patcher☆33Updated 2 years ago
- Random Code Store☆17Updated last year
- Anti-AV compilation☆42Updated 11 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆21Updated 8 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- ☆33Updated 7 years ago
- ☆22Updated 4 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Generate RSA keys, encrypt and decrypt data☆24Updated 3 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated 4 months ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Summit Route End Point Protection - Server code☆12Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- MALM: Malware Monitor☆49Updated 11 years ago
- Parse Microsoft shim databases☆29Updated last month
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- Common Malware Techniques☆13Updated last year
- A fork of David B Heise's VirusTotal Powershell Module☆17Updated 2 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- Network detector for Winnti malware☆20Updated 6 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Updated 8 years ago