Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Invoke-Obfuscation Via Stdin

Detects Obfuscated Powershell via Stdin in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Mon Oct 12windows
Detectionhightest

Invoke-Obfuscation Via Use Clip

Detects Obfuscated Powershell via use Clip.exe in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Fri Oct 09windows
Detectionhightest

Invoke-Obfuscation Via Use MSHTA

Detects Obfuscated Powershell via use MSHTA in Scripts

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Nikita Nazarov+1Thu Oct 08windows
Detectionhightest

Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION

Detects Obfuscated Powershell via VAR++ LAUNCHER

WindowsProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or InformationTA0002 · ExecutionT1059.001 · PowerShell
Timur Zinniatullin+1Tue Oct 13windows
Detectionhightest

HackTool - Koadic Execution

Detects command line parameters used by Koadic hack tool

WindowsProcess Creation
TA0002 · ExecutionT1059.003 · Windows Command ShellT1059.005 · Visual BasicT1059.007 · JavaScript
wagga+2Sun Jan 12windows
Detectionhightest

HackTool - KrbRelay Execution

Detects the use of KrbRelay, a Kerberos relaying tool

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Florian Roth (Nextron Systems)Wed Apr 27windows
Detectionhightest

HackTool - RemoteKrbRelay Execution

Detects the use of RemoteKrbRelay, a Kerberos relaying tool via CommandLine flags and PE metadata.

WindowsProcess Creation
TA0006 · Credential AccessT1558.003 · Kerberoasting
Nasreddine Bencherchali (Nextron Systems)Thu Jun 27windows
Detectionhightest

HackTool - KrbRelayUp Execution

Detects KrbRelayUp used to perform a universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced

WindowsProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessT1558.003 · KerberoastingTA0008 · Lateral Movement+1
Florian Roth (Nextron Systems)Tue Apr 26windows
Detectionhightest

HackTool - LocalPotato Execution

Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalationcve.2023-21746
Nasreddine Bencherchali (Nextron Systems)Tue Feb 14windows
Detectionhightest

Potential Meterpreter/CobaltStrike Activity

Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service starting

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1134.001 · Token Impersonation/TheftT1134.002 · Create Process with Token
Teymur Kheirkhabarov+2Sat Oct 26windows
Detectionhightest

HackTool - Mimikatz Execution

Detection well-known mimikatz command line arguments

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS MemoryT1003.002 · Security Account ManagerT1003.004 · LSA Secrets+2
Teymur Kheirkhabarov+3Tue Oct 22windows
Detectionhightest

HackTool - PCHunter Execution

Detects suspicious use of PCHunter, a tool like Process Hacker to view and manipulate processes, kernel options and other low level stuff

WindowsProcess Creation
TA0002 · ExecutionTA0007 · DiscoveryT1082 · System Information DiscoveryT1057 · Process Discovery+3
Florian Roth (Nextron Systems)+1Mon Oct 10windows
Detectionhightest

HackTool - Default PowerSploit/Empire Scheduled Task Creation

Detects the creation of a schtask via PowerSploit or Empire Default Configuration.

WindowsProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationS0111 · schtasks+5
Markus NeisTue Mar 06windows
Detectionhightest

HackTool - PowerTool Execution

Detects the execution of the tool PowerTool which has the ability to kill a process, delete its process file, unload drivers, and delete the driver files

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Nasreddine Bencherchali (Nextron Systems)Tue Nov 29windows
Detectionhightest

HackTool - Pypykatz Credentials Dumping Activity

Detects the usage of "pypykatz" to obtain stored credentials. Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database through Windows registry where the SAM database is stored

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
François HubautWed Jan 05windows
Detectionhightest

HackTool - Quarks PwDump Execution

Detects usage of the Quarks PwDump tool via commandline arguments

WindowsProcess Creation
TA0006 · Credential AccessT1003.002 · Security Account Manager
Nasreddine Bencherchali (Nextron Systems)Mon Sep 05windows
Detectionhightest

HackTool - RedMimicry Winnti Playbook Execution

Detects actions caused by the RedMimicry Winnti playbook a automated breach emulations utility

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1106 · Native APIT1059.003 · Windows Command Shell+1
Alexander RauschWed Jun 24windows
Detectionhightest

HackTool - PPID Spoofing SelectMyParent Tool Execution

Detects the use of parent process ID spoofing tools like Didier Stevens tool SelectMyParent

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1134.004 · Parent PID Spoofing
Florian Roth (Nextron Systems)Sat Jul 23windows
Detectionhightest

HackTool - SharpChisel Execution

Detects usage of the Sharp Chisel via the commandline arguments

WindowsProcess Creation
TA0011 · Command and ControlT1090.001 · Internal Proxy
Nasreddine Bencherchali (Nextron Systems)Mon Sep 05windows
Detectionhightest

HackTool - SharpDPAPI Execution

Detects the execution of the SharpDPAPI tool based on CommandLine flags and PE metadata. SharpDPAPI is a C# port of some DPAPI functionality from the Mimikatz project.

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1134.001 · Token Impersonation/TheftT1134.003 · Make and Impersonate Token
Nasreddine Bencherchali (Nextron Systems)Wed Jun 26windows
Detectionhightest

HackTool - SharpImpersonation Execution

Detects execution of the SharpImpersonation tool. Which can be used to manipulate tokens on a Windows computers remotely (PsExec/WmiExec) or interactively

WindowsProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1134.001 · Token Impersonation/TheftT1134.003 · Make and Impersonate Token
Sai Prashanth Pulisetti+1Tue Dec 27windows
Detectionhightest

HackTool - SharPersist Execution

Detects the execution of the hacktool SharPersist - used to deploy various different kinds of persistence mechanisms

WindowsProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053 · Scheduled Task/Job
Florian Roth (Nextron Systems)Thu Sep 15windows
Detectionhightest

HackTool - SharpEvtMute Execution

Detects the use of SharpEvtHook, a tool that tampers with the Windows event logs

WindowsProcess Creation
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
Florian Roth (Nextron Systems)Wed Sep 07windows
Detectionhightest

HackTool - SharpLdapWhoami Execution

Detects SharpLdapWhoami, a whoami alternative that queries the LDAP service on a domain controller

WindowsProcess Creation
TA0007 · DiscoveryT1033 · System Owner/User Discovery2016-03-001 · CAR 2016-03-001
Florian Roth (Nextron Systems)Mon Aug 29windows
Detectionhightest

HackTool - SharpMove Tool Execution

Detects the execution of SharpMove, a .NET utility performing multiple tasks such as "Task Creation", "SCM" query, VBScript execution using WMI via its PE metadata and command line options.

WindowsProcess Creation
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Luca Di Bartolomeo (CrimpSec)Mon Jan 29windows
Detectionhighexperimental

HKTL - SharpSuccessor Privilege Escalation Tool Execution

Detects the execution of SharpSuccessor, a tool used to exploit the BadSuccessor attack for privilege escalation in WinServer 2025 Active Directory environments. Successful usage of this tool can let the attackers gain the domain admin privileges by exploiting the BadSuccessor vulnerability.

WindowsProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 06windows
Detectionhightest

HackTool - SharpView Execution

Adversaries may look for details about the network configuration and settings of systems they access or through information discovery of remote systems

WindowsProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections DiscoveryT1069.002 · Domain GroupsT1482 · Domain Trust Discovery+2
François HubautFri Dec 10windows
Detectionhightest

HackTool - SharpWSUS/WSUSpendu Execution

Detects the execution of SharpWSUS or WSUSpendu, utilities that allow for lateral movement through WSUS. Windows Server Update Services (WSUS) is a critical component of Windows systems and is frequently configured in a way that allows an attacker to circumvent internal networking limitations.

WindowsProcess Creation
TA0002 · ExecutionTA0008 · Lateral MovementT1210 · Exploitation of Remote Services
kostastsale+1Fri Oct 07windows
Detectionhightest

HackTool - SILENTTRINITY Stager Execution

Detects SILENTTRINITY stager use via PE metadata

WindowsProcess Creation
TA0011 · Command and ControlT1071 · Application Layer Protocol
Aleksey Potapov+1Tue Oct 22windows
Detectionhightest

HackTool - SOAPHound Execution

Detects the execution of SOAPHound, a .NET tool for collecting Active Directory data, using specific command-line arguments that may indicate an attempt to extract sensitive AD information.

WindowsProcess Creation
TA0007 · DiscoveryT1087 · Account Discovery
kostastsaleFri Jan 26windows
Detectionhightest

HackTool - Stracciatella Execution

Detects Stracciatella which executes a Powershell runspace from within C# (aka SharpPick technique) with AMSI, ETW and Script Block Logging disabled based on PE metadata characteristics.

WindowsProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059 · Command and Scripting InterpreterT1562.001 · Disable or Modify Tools
Martin MuellerMon Apr 17windows
Detectionhightest

HackTool - TruffleSnout Execution

Detects the use of TruffleSnout.exe an iterative AD discovery toolkit for offensive operators, situational awareness and targeted low noise enumeration.

WindowsProcess Creation
TA0007 · DiscoveryT1482 · Domain Trust Discovery
François HubautSat Aug 20windows
Detectionhightest

HackTool - UACMe Akagi Execution

Detects the execution of UACMe, a tool used for UAC bypasses, via default PE metadata

WindowsProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548.002 · Bypass User Account Control
Christian Burkard (Nextron Systems)+1Mon Aug 30windows
Detectionhightest

HackTool - winPEAS Execution

WinPEAS is a script that search for possible paths to escalate privileges on Windows hosts. The checks are explained on book.hacktricks.xyz

WindowsProcess Creation
TA0004 · Privilege EscalationTA0007 · DiscoveryT1082 · System Information DiscoveryT1087 · Account Discovery+1
Georg Lauenstein (sure[secure])Mon Sep 19windows
Detectionhightest

HackTool - WinPwn Execution

Detects commandline keywords indicative of potential usge of the tool WinPwn. A tool for Windows and Active Directory reconnaissance and exploitation.

WindowsProcess Creation
TA0006 · Credential AccessTA0005 · Defense EvasionTA0007 · DiscoveryTA0002 · Execution+9
Swachchhanda Shrawan PoudelMon Dec 04windows
Detectionhightest

HackTool - Wmiexec Default Powershell Command

Detects the execution of PowerShell with a specific flag sequence that is used by the Wmiexec script

WindowsProcess Creation
TA0005 · Defense EvasionTA0008 · Lateral Movement
Nasreddine Bencherchali (Nextron Systems)Wed Mar 08windows
Detectionhighexperimental

HackTool - WSASS Execution

Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.

WindowsProcess Creation
TA0006 · Credential AccessT1003.001 · LSASS Memory
Swachchhanda Shrawan Poudel (Nextron Systems)Sun Nov 23windows
Detectionhightest

HackTool - XORDump Execution

Detects suspicious use of XORDump process memory dumping utility

WindowsProcess Creation
TA0005 · Defense EvasionT1036 · MasqueradingT1003.001 · LSASS MemoryTA0006 · Credential Access
Florian Roth (Nextron Systems)Fri Jan 28windows
Detectionhighexperimental

Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine

Detects the tampering of Hypervisor-protected Code Integrity (HVCI) related registry values via command line tool reg.exe. HVCI uses virtualization-based security to protect code integrity by ensuring that only trusted code can run in kernel mode. Adversaries may tamper with HVCI to load malicious or unsigned drivers, which can be used to escalate privileges, maintain persistence, or evade security mechanisms.

WindowsProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Swachchhanda Shrawan Poudel (Nextron Systems)Mon Jan 26windows
Detectionhightest

Suspicious HWP Sub Processes

Detects suspicious Hangul Word Processor (Hanword) sub processes that could indicate an exploitation

WindowsProcess Creation
TA0001 · Initial AccessT1566.001 · Spearphishing AttachmentTA0002 · ExecutionT1203 · Exploitation for Client Execution+2
Florian Roth (Nextron Systems)Thu Oct 24windows
Detectionhightest

File Download And Execution Via IEExec.EXE

Detects execution of the IEExec utility to download and execute files

WindowsProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Mon May 16windows
Detectionhightest

Self Extracting Package Creation Via Iexpress.EXE From Potentially Suspicious Location

Detects the use of iexpress.exe to create binaries via Self Extraction Directive (SED) files located in potentially suspicious locations. This behavior has been observed in-the-wild by different threat actors.

WindowsProcess Creation
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Joseliyo Sanchez+1Mon Feb 05windows
Detectionhightest

Disable Windows IIS HTTP Logging

Disables HTTP logging on a Windows IIS web server as seen by Threat Group 3390 (Bronze Union)

WindowsProcess Creation
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
François HubautSun Jan 09windows
Detectionhightest

Microsoft IIS Service Account Password Dumped

Detects the Internet Information Services (IIS) command-line tool, AppCmd, being used to list passwords

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+2Tue Nov 08windows
Detectionhightest

Microsoft IIS Connection Strings Decryption

Detects use of aspnet_regiis to decrypt Microsoft IIS connection strings. An attacker with Microsoft IIS web server access via a webshell or alike can decrypt and dump any hardcoded connection strings, such as the MSSQL service account password using aspnet_regiis command.

WindowsProcess Creation
TA0006 · Credential AccessT1003 · OS Credential Dumping
Tim Rauch+1Wed Sep 28windows
Detectionhightest

Suspicious IIS Module Registration

Detects a suspicious IIS module registration as described in Microsoft threat report on IIS backdoors

WindowsProcess Creation
TA0003 · PersistenceT1505.004 · IIS Components
Florian Roth (Nextron Systems)+1Thu Aug 04windows
Detectionhightest

ImagingDevices Unusual Parent/Child Processes

Detects unusual parent or children of the ImagingDevices.exe (Windows Contacts) process as seen being used with Bumblebee activity

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Sep 27windows
Detectionhightest

Arbitrary File Download Via IMEWDBLD.EXE

Detects usage of "IMEWDBLD.exe" to download arbitrary files

WindowsProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1218 · System Binary Proxy Execution
Swachchhanda Shrawan PoudelThu Nov 09windows