SigmaHQ/rules/windows/powershell
Alessio Dalla Piazza f45587074b
Add the ability to detect PowerUp - Invoke-AllChecks
PowerUp allow attackers to check if is possible to have a local privilege escalation attacks against Windows systems. The main function is called "Invoke-AllChecks" and check possible path of escalation.
2019-12-23 11:50:57 +01:00
..
powershell_data_compressed.yml Data Compressed duplciate titles 2019-12-09 16:24:10 +00:00
powershell_downgrade_attack.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_exe_calling_ps.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_malicious_commandlets.yml Add the ability to detect PowerUp - Invoke-AllChecks 2019-12-23 11:50:57 +01:00
powershell_malicious_keywords.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_ntfs_ads_access.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_prompt_credentials.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_psattack.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_shellcode_b64.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_download.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_invocation_generic.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_invocation_specific.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_suspicious_keywords.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00
powershell_winlogon_helper_dll.yml Added UUIDs to rules 2019-11-12 23:12:27 +01:00