last-byte / PersistenceSniper

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
Other
1.83k stars 180 forks source link

NEW FEATURE: ETW Interfacing #22

Open ablescia opened 6 months ago

ablescia commented 6 months ago

PersistenceSniper is an excellent tool for detecting persistences on a system. I use it regularly in my daily Threat Hunting activities. But I believe also this tool could significantly enhance a Detection Engineer's program.

For this reason, the Write-ToETW module is essential to forward the PersistenceSniper result to ETW (Event Trace for Windows) and then ingest into a SIEM.

By using a custom provider, we can have preformatted events that do not require parsing during the ingestion phase. write-toetw

To avoid retro-compatibility problems, this pull request contains a separate folder called Plugins/Write-ToETW that contains the following files: