EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

HackTool - Generic Process Access

Detects process access requests from hacktool processes based on their default image name

T1003.001S0002
Sigmahigh

HackTool - GMER Rootkit Detector and Remover Execution

Detects the execution GMER tool based on image and hash fields.

Sigmahigh

HackTool - HandleKatz Duplicating LSASS Handle

Detects HandleKatz opening LSASS to duplicate its handle to later dump the memory without opening any new handles

T1106T1003.001
Sigmahigh

HackTool - HandleKatz LSASS Dumper Execution

Detects the use of HandleKatz, a tool that demonstrates the usage of cloned handles to Lsass in order to create an obfuscated memory dump of the same

T1003.001
Sigmahigh

HackTool - Hashcat Password Cracker Execution

Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against

T1110.002
Sigmahigh

HackTool - HollowReaper Execution

Detects usage of HollowReaper, a process hollowing shellcode launcher used for stealth payload execution through process hollowing. It replaces the memory of a legitimate process with custom shellcode, allowing the attacker to execute payloads under the guise of trusted binaries.

T1055.012
Sigmahigh

HackTool - Htran/NATBypass Execution

Detects executable names or flags used by Htran or Htran-like tools (e.g. NATBypass)

T1090S0040
Sigmahigh

HackTool - Hydra Password Bruteforce Execution

Detects command line parameters used by Hydra password guessing hack tool

T1110T1110.001
Sigmahigh

HackTool - Impacket File Indicators

Detects file creation events with filename patterns used by Impacket.

T1003.001
Sigmahigh

HackTool - Impacket Tools Execution

Detects the execution of different compiled Windows binaries of the impacket toolset (based on names or part of their names - could lead to false positives)

T1557.001
Sigmahigh

HackTool - Impersonate Execution

Detects execution of the Impersonate tool. Which can be used to manipulate tokens on a Windows computers remotely (PsExec/WmiExec) or interactively

T1134.001T1134.003
Sigmamedium

HackTool - Inveigh Execution

Detects the use of Inveigh a cross-platform .NET IPv4/IPv6 machine-in-the-middle tool

T1003.001
Sigmacritical

HackTool - Inveigh Execution Artefacts

Detects the presence and execution of Inveigh via dropped artefacts

T1219.002
Sigmacritical

HackTool - Jlaive In-Memory Assembly Execution

Detects the use of Jlaive to execute assemblies in a copied PowerShell

T1059.003
Sigmamedium

HackTool - Koadic Execution

Detects command line parameters used by Koadic hack tool

T1059.003T1059.005T1059.007
Sigmahigh

HackTool - Koh Default Named Pipe

Detects creation of default named pipes used by the Koh tool

T1528T1134.001
Sigmacritical

HackTool - KrbRelay Execution

Detects the use of KrbRelay, a Kerberos relaying tool

T1558.003
Sigmahigh

HackTool - KrbRelayUp Execution

Detects KrbRelayUp used to perform a universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced

T1558.003T1550.003
Sigmahigh

HackTool - LaZagne Execution

Detects the execution of the LaZagne. A utility used to retrieve multiple types of passwords stored on a local computer. LaZagne has been leveraged multiple times by threat actors in order to dump credentials.

Sigmamedium

HackTool - LittleCorporal Generated Maldoc Injection

Detects the process injection of a LittleCorporal generated Maldoc.

T1204.002T1055.003
Sigmahigh

HackTool - LocalPotato Execution

Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples

Sigmahigh

HackTool - Mimikatz Execution

Detection well-known mimikatz command line arguments

T1003.001T1003.002T1003.004T1003.005T1003.006
Sigmahigh

HackTool - Mimikatz Kirbi File Creation

Detects the creation of files created by mimikatz such as ".kirbi", "mimilsa.log", etc.

T1558
Sigmacritical

HackTool - NoFilter Execution

Detects execution of NoFilter, a tool for abusing the Windows Filtering Platform for privilege escalation via hardcoded policy name indicators

T1134T1134.001
Sigmahigh
PreviousPage 37 of 136Next