sisoc-tokyo / mimikatz_detectionLinks
☆12Updated 7 years ago
Alternatives and similar repositories for mimikatz_detection
Users that are interested in mimikatz_detection are comparing it to the libraries listed below
Sorting:
- Presentation materials for talks I've given.☆20Updated 5 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- ☆30Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Public rules and samples for various automations through LimaCharlie.io☆12Updated 3 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 6 months ago
- ☆25Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated last year
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- ☆14Updated 7 years ago
- OSSEM Modular☆27Updated 4 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- ☆11Updated 4 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- Analytics for Accounting logs from Network devices☆17Updated 4 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Old home of LimaCharlie, open source EDR☆30Updated last year
- ☆22Updated 4 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆16Updated 6 years ago