SigmaHQ/rules/windows/powershell
Thomas Patzke 924e1feb54 UUIDs + moved unsupported logic
* Added UUIDs to all contributed rules
* Moved unsupported logic directory out of rules/ because this breaks CI
  testing.
2019-12-19 23:56:36 +01:00
..
powershell_alternate_powershell_hosts.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_clear_powershell_history.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_data_compressed.yml Data Compressed duplciate titles 2019-12-09 16:24:10 +00:00
powershell_dnscat_execution.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_downgrade_attack.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_exe_calling_ps.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_invoke_obfuscation_obfuscated_iex.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_malicious_commandlets.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_malicious_keywords.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_ntfs_ads_access.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_prompt_credentials.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_psattack.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_remote_powershell_session.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_shellcode_b64.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_download.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_invocation_generic.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_invocation_specific.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_keywords.yml UUIDs + moved unsupported logic 2019-12-19 23:56:36 +01:00
powershell_winlogon_helper_dll.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00