This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Custom.Windows.Detection.ProcessHollowing | |
description: | | |
Use hollows_hunter to detect suspicious process injections. | |
Upload any findings to the server, including process dumps. | |
tools: | |
- name: hollows_hunter | |
url: https://github.com/hasherezade/hollows_hunter/releases/download/v0.2.7.1/hollows_hunter64.exe |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Custom.Splunk.Flows.Upload | |
description: | | |
Upload all collected results of a specific artifact type to a splunk index. | |
type: SERVER_EVENT | |
parameters: | |
- name: ArtifactName | |
default: Generic.Client.Info/Users | |
description: Only upload these artifacts to splunk |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Custom.Label.User | |
description: | | |
This artifact watches for new client enrolments and automatically label | |
the client with the required label if the user exists. | |
This artifact can be the starting point for automatically labeling a machine | |
based on any other property - just change the artifact to watch and the result | |
filter. | |
type: SERVER_EVENT |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Get-InjectedThread | |
{ | |
<# | |
.SYNOPSIS | |
Looks for threads that were created as a result of code injection. | |
.DESCRIPTION | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Custom.Uninstall.Velociraptor | |
description: | | |
Uninstall Velociraptor which was installed using | |
``` | |
Velociraptor.exe --config client.config.yaml service install | |
``` | |
The problem with installation method is that it becomes hard to remove since it | |
is not properly managed by the windows installer. We can not delete the executable |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// | |
// File: fsevents_windows.go | |
// Date: October 29, 2013 | |
// Author: Peter Krnjevic <[email protected]>, on the shoulders of many others | |
// | |
// This code sample is released into the Public Domain. | |
// | |
package fsevents | |
import ( |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python3 | |
import argparse | |
import struct | |
if __name__ == "__main__": | |
argument_parser = argparse.ArgumentParser("make_exe_gui") | |
argument_parser.add_argument("exe", help="Path to the exe to change") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
autoexec: | |
argv: | |
- "-v" | |
- "artifacts" | |
- "collect" | |
- MemoryAcquisition | |
artifact_definitions: | |
- name: MemoryAcquisition | |
description: | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: TestMe | |
parameters: | |
- name: data | |
default: | | |
[{ | |
"config": [ | |
{ | |
"AttrCONFIG.SECTION": "SECTION 1" | |
}, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Custom.Windows.EventLog.BadAccounts | |
description: | | |
Parses all the event logs on the endpoint and sends back any single event that is | |
related to a certain user account or SID (or any string pattern actually). | |
This is very useful for finding unknown application event logs related to lateral | |
movement. | |
precondition: SELECT OS From info() where OS = 'windows' |