Skip to content

Instantly share code, notes, and snippets.

Avatar

JPMinty

View GitHub Profile
@sminez
sminez / get_ippsec_details.py
Last active Mar 5, 2021
Find examples of pen testing methods and tools in videos by Ippsec (as of 22nd January 2020)
View get_ippsec_details.py
#!/usr/bin/env python3
"""
Script used to pull down the current video descriptions from ippsec's youtube channel.
The raw output still has a few HTML tags that need to be manually removed and there
also seem to be multiple duplicates of videos that have been removed in the output
saved as ippsec-details.txt
"""
import re
import sys
View GetPEFeature.ps1
filter Get-PEFeature {
<#
.SYNOPSIS
Retrieves key features from PE files that can be used to build detections.
.DESCRIPTION
Get-PEFeature extracts key features of PE files that are relevant to building detections.
@jaredcatkinson
jaredcatkinson / Get-InjectedThread.ps1
Last active Sep 19, 2021
Code from "Taking Hunting to the Next Level: Hunting in Memory" presentation at SANS Threat Hunting Summit 2017 by Jared Atkinson and Joe Desimone
View Get-InjectedThread.ps1
function Get-InjectedThread
{
<#
.SYNOPSIS
Looks for threads that were created as a result of code injection.
.DESCRIPTION
@atifaziz
atifaziz / Get-ProcessTree.ps1
Last active Aug 5, 2021
PowerShell 2.0 script to get processes tree
View Get-ProcessTree.ps1
# Copyright (c) 2014 Atif Aziz. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,