17 Commits

Author SHA1 Message Date
2eecc65698 New Sliver and Metasploit EVTX files including cmd.exe writing to ADMIN$, and suspicious remote threads 2023-06-28 16:33:55 -04:00
ddb9e3e0fa Added code to support flagging suspicious wmi filter events, also added sample log file 2021-09-16 13:55:34 +01:00
3fae5dbef6 Update to catch services.exe DAC permission change to hide services 2020-09-14 16:37:59 -04:00
612cde1cf3 Disable Metasploit psexec detect due to false-positive conflict with MS Exchange; revise alert for _Multiple admin logons for one account_ to show attempt count instead of unique event IDs 2019-05-06 14:34:31 -04:00
9a293b974e Add more Mimikatz detection, focusing on token::elevate as a non-admin user 2019-05-03 06:33:20 -04:00
f17d32491e Add password spray detection, sample evtx 2019-04-30 17:11:56 -04:00
6766ac618c Add Event ID 4673 Sensitive Privilege Use detection for Mimikatz 2019-04-30 14:38:43 -04:00
2fe7d13599 Add detector and event log to watch for Event Log Service stop/start as an indicator or event log tampering with eventlogedit 2019-04-28 14:23:23 -04:00
18ba3fc256 Delete Powershell-Invoke-Obfuscation-token-menu.evtx 2017-09-22 14:14:02 -04:00
7f90195d1d Added Invoke-Obfuscation sample evtx files 2017-08-30 15:49:46 -04:00
5a2f201331 Delete readme.md 2016-09-21 10:06:01 -04:00
821ca4c318 Add files via upload 2016-09-21 00:03:48 -04:00
d1d21c91a1 Delete metasploit-psexec-native-upload-target-system.evtx 2016-09-21 00:03:36 -04:00
c45dbc3655 Delete metasploit-psexec-native-upload-target-security.evtx 2016-09-21 00:03:26 -04:00
cdf59ab6b5 Add files via upload 2016-09-20 23:58:54 -04:00
9c6854a0b2 Add files via upload 2016-09-20 15:35:54 -04:00
9250e34d6c Create readme.md 2016-09-20 15:34:36 -04:00