To setup HELK, please refer the following Video : https://drive.google.com/drive/folders/11ELLPmjHy6c3IuV9MJAlWMif0Y2kXlEq
- ETW Basics and Setup with HELK
- Playing around with multiple ETW Providers
- Weaponizing ETW-TI for Detection
- Detecting various "Defense Evasion" Techniques (PPID Spoofing)
- Detecting various "Defense Evasion" Techniques (Command Line Spoofing)
- Detecting .NET Tools and Attack Techniques (AppDomain Abuse, SharpPick etc.)
- Detecting LOLBAS, BYOL & BYOI Techniques
- Detecting Techniques leveraged by various C2 Agents
HELK : https://github.com/Cyb3rWard0g/HELK
SilkETW : https://github.com/mandiant/SilkETW
Sealighter (v1.5) : https://github.com/pathtofile/Sealighter
WEPExplorer : https://github.com/lallousx86/WinTools/tree/master/WEPExplorer
ETW-Event-Dumper : https://github.com/woanware/etw-event-dumper