mandiant/flare-wmi
Fork: 108 Star: 416 (更新于 2024-11-06 19:15:45)
license: Apache-2.0
Language: C++ .
最后发布版本: v1.0 ( 2015-08-11 01:46:51)
flare-wmi
This repository contains various documentation and code projects that describe the Windows Management Instrumentation (WMI) technology. The research was first introduced at Defcon 23 in 2015, and the associated slides are available here: DEFCON_23-WMI-Attacks-Defense-Forensics.pdf.
python-cim (active development)
python-cim is a pure Python parser for the WMI repository database. It supports read access to WMI structures via a flexible API. You can use the provided "sample" scripts to dump persistence locations, identify commonly executed software, timeline activity, and recover deleted data.
WMIParser (unmaintained)
WMIParser is a forensic parser for the WMI repository database files that can extract FilterToConsumerBindings
that malicious actors have hijacked.
The parser is written in C.
WMI-IDS (unmaintained)
WMI-IDS is a proof-of-concept agent-less host intrusion detection system designed to showcase the unique ability of WMI to respond to and react to operating system events in real-time. WMI-IDS is a PowerShell module that serves as an installer of WMI events on a local or remote system.
最近版本更新:(数据更新于 2024-09-21 03:04:45)
2015-08-11 01:46:51 v1.0
主题(topics):
fireeye-flare, forensics, python, wmi
mandiant/flare-wmi同语言 C++最近更新仓库
2024-11-12 22:32:53 PCSX2/pcsx2
2024-11-11 01:07:39 mudler/LocalAI
2024-11-10 05:02:57 LizardByte/Sunshine
2024-11-08 16:52:36 ExpressLRS/ExpressLRS
2024-11-08 05:48:17 ClickHouse/ClickHouse
2024-11-07 05:10:33 pwsafe/pwsafe