-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
fix: Potential NT API Stub Patching - Tune FP filter new: Credential Dumping Activity By Python Based Tool new: HackTool - Generic Process Access remove: Credential Dumping Tools Accessing LSASS Memory update: Credential Dumping Activity Via Lsass - Update selection to increase coverage and filters to tune false positives update: Credential Dumping Attempt Via WerFault - Update title update: Function Call From Undocumented COM Interface EditionUpgradeManager - Reduce level to medium update: HackTool - CobaltStrike BOF Injection Pattern - Update title update: HackTool - HandleKatz Duplicating LSASS Handle - Update title update: HackTool - LittleCorporal Generated Maldoc Injection - Update title update: HackTool - SysmonEnte Execution - Add additional location of Sysmon, update title and filters update: HackTool - winPEAS Execution - Add additional image names for winPEAS update: LSASS Access From Potentially White-Listed Processes - Update title and description update: LSASS Access From Program In Potentially Suspicious Folder - Update filters to take into account other drivers than C: update: LSASS Memory Access by Tool With Dump Keyword In Name - Update title and description update: Lsass Memory Dump via Comsvcs DLL - Reduce level and remove path from filter to account for any location of rundll32 update: Malware Shellcode in Verclsid Target Process - Move to hunting folder update: Potential Credential Dumping Attempt Via PowerShell - Reduce level to medium, update description and move to hunting folder update: Potential Defense Evasion Via Raw Disk Access By Uncommon Tools - Update filters and metadata update: Potential Process Hollowing Activity - Update FP filter update: Potential Shellcode Injection - Update title and enhance false positive filter update: Potentially Suspicious GrantedAccess Flags On LSASS - update: Remote LSASS Process Access Through Windows Remote Management - Update title, description and filter to account for installation other than C: update: Suspicious Svchost Process Access - Enhance filter to account for installation in non C: locations update: Uncommon GrantedAccess Flags On LSASS - Enhance false positive filter --------- Co-authored-by: phantinuss <[email protected]> Thanks: swachchhanda000
- Loading branch information
1 parent
0e27834
commit 19d271b
Showing
39 changed files
with
605 additions
and
512 deletions.
There are no files selected for viewing
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
84 changes: 0 additions & 84 deletions
84
rules/windows/process_access/proc_access_win_direct_syscall_ntopenprocess.yml
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.