Skip to content

Instantly share code, notes, and snippets.



View GitHub Profile
JPMinty / Get-InjectedThread.ps1
Created Apr 17, 2020 — forked from jaredcatkinson/Get-InjectedThread.ps1
Code from "Taking Hunting to the Next Level: Hunting in Memory" presentation at SANS Threat Hunting Summit 2017 by Jared Atkinson and Joe Desimone
View Get-InjectedThread.ps1
function Get-InjectedThread
Looks for threads that were created as a result of code injection.
View GetPEFeature.ps1
filter Get-PEFeature {
Retrieves key features from PE files that can be used to build detections.
Get-PEFeature extracts key features of PE files that are relevant to building detections.
JPMinty / Get-ProcessTree.ps1
Last active Feb 3, 2022 — forked from atifaziz/Get-ProcessTree.ps1
PowerShell 2.0 script to get processes tree
View Get-ProcessTree.ps1
# Modified to include support for CommandLine, File Hashes, File Paths, Signing Certificates
# Copyright (c) 2020 Jai Minton. All rights reserved.
# Copyright (c) 2014 Atif Aziz. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
JPMinty /
Created Jul 10, 2019 — forked from sminez/
Find examples of pen testing methods and tools in videos by Ippsec (as of 26th June 2019)
#!/usr/bin/env python3
Script used to pull down the current video descriptions from ippsec's youtube channel.
The raw output still has a few HTML tags that need to be manually removed and there
also seem to be multiple duplicates of videos that have been removed in the output
saved as ippsec-details.txt
import re
import sys