- some LPE(s)
- PetitPotam (from Coercer)
- privesc on some DLL creation
- Lsass memory dump via microsoft TTTracer
- one for detecting Canary accounts (which will be trigguered via Kerberoasting attack)
-
ProcDump.py is as you might expect to run a ProcDump on a process pid. pid to be passed as argument. (this is not my code but from somebody I don't know )
-
Fullmemorydump.py is as you might expect to run winpmem to get the entire memory dump for Forensic purpose.
- XDR_loldriver.io_update_IOC.py
- Original filenames field in process events and other data
- Driver load signature field (against BYOVD)
- BIOC specific fields to report in a Alert (basically give in the Alert the fields you want to show to the operator)
- Every hour or so, check your own subscription as a ETW provider (against BYOVD)