Goals: Add links that are reasonable and good explanations of how stuff works. No hype and no vendor content if possible. Practical first-hand accounts of models in prod eagerly sought.
| sudo sntp -sS time.apple.com |
| # Copyright 2024 Malwarology LLC | |
| # | |
| # Use of this source code is governed by an MIT-style | |
| # license that can be found in the LICENSE file or at | |
| # https://opensource.org/licenses/MIT. | |
| """Unit tests for linting the project modules and the unit test modules. | |
| Imported From: | |
| https://gist.github.com/utkonos/9c9ac127d2d08e648c58c4e07bf68a25 | |
| """ |
| ID | Name | MitigatedByAppControl | Notes | |
|---|---|---|---|---|
| T1001 | Data Obfuscation | Not Applicable | Relevant sub-techniques addressed below | |
| T1001.001 | Junk Data | No | Technique is not necessarily related to the execution of arbitrary code on an endpoint. | |
| T1001.002 | Steganography | Limited | If custom attacker code were necessary to perform this technique, it would be prevented. | |
| T1001.003 | Protocol Impersonation | Limited | If custom attacker code were necessary to perform this technique, it would be prevented. | |
| T1003 | OS Credential Dumping | Not Applicable | Relevant sub-techniques addressed below | |
| T1003.001 | LSASS Memory | Limited | Built-in utilities exist to perform this technique. They would have to be explicitly blocked. | |
| T1003.002 | Security Account Manager | Limited | Built-in utilities exist to perform this technique. They would have to be explicitly blocked. | |
| T1003.003 | NTDS | Limited | Built-in utilities exist to perform this technique. They would have to be explicitly blocked. | |
| T1003.004 | LSA Secrets | Limited | Built-in utilities exist to perform this technique. |
| $ISOFile = "C:\Users\DELL\Downloads\17763.737.190906-2324.rs5_release_svc_refresh_SERVERHYPERCORE_OEM_x64FRE_en-us_1.iso" | |
| $USBDrive = Get-Disk | Where FriendlyName -eq " USB Flash Memory" | |
| $USBDrive | Clear-Disk -RemoveData -Confirm:$true -PassThru | |
| $USBDrive | Set-Disk -PartitionStyle GPT | |
| $Volume = $USBDrive | New-Partition -UseMaximumSize -AssignDriveLetter | Format-Volume -FileSystem FAT32 -NewFileSystemLabel WS2019 | |
| $ISOMounted = Mount-DiskImage -ImagePath $ISOFile -StorageType ISO -PassThru | |
| $ISODriveLetter = ($ISOMounted | Get-Volume).DriveLetter | |
| Copy-Item -Path ($ISODriveLetter +":\*") -Destination ($Volume.DriveLetter + ":\") -Recurse |
| #!/usr/bin/env python3 | |
| # | |
| # based on code from http://trendystephen.blogspot.be/2008/01/rich-header.html | |
| # and from https://gist.github.com/skochinsky/07c8e95e33d9429d81a75622b5d24c8b | |
| import sys | |
| import struct | |
| # I'm trying not to bury the magic number... | |
| CHECKSUM_MASK = 0x536e6144 # DanS (actuall SnaD) | |
| RICH_TEXT = b'Rich' |
| #!/usr/bin/env python3 | |
| # | |
| # Extracts prodid enumeration from a given binary file | |
| # Example usage: | |
| # extract-prodids.py -f msobj140-msvcrt.lib | |
| # | |
| import re, argparse, struct | |
| # Note: care must be taken of a format of RE string as following works only | |
| # with msobj140-msvcrt.lib for certain |
| # Ransomware Killer v0.1 by Thomas Patzke <[email protected]> | |
| # Kill all parent processes of the command that tries to run "vssadmin Delete Shadows" | |
| # IMPORTANT: This must run with Administrator privileges! | |
| Register-WmiEvent -Query "select * from __instancecreationevent within 0.1 where targetinstance isa 'win32_process' and targetinstance.CommandLine like '%vssadmin%Delete%Shadows%'" -Action { | |
| # Kill all parent processes from detected vssadmin process | |
| $p = $EventArgs.NewEvent.TargetInstance | |
| while ($p) { | |
| $ppid = $p.ParentProcessID | |
| $pp = Get-WmiObject -Class Win32_Process -Filter "ProcessID=$ppid" | |
| Write-Host $p.ProcessID |
| ''' | |
| Gets possible Great Cannon injections from UrlScan | |
| ''' | |
| import requests | |
| import json | |
| # Insert your urlscan API Key | |
| api_key = '' |