Revoke-Obfuscation v1.0 Logo

Revoke-Obfuscation v1.0

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

751
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Revoke-Obfuscation v1.0 Description

Revoke-Obfuscation is a PowerShell v3.0+ compatible PowerShell obfuscation detection framework. It was designed to highlight the limitations of a purely signature-based approach to detecting attackers' usage of PowerShell. It provides a new, scalable means of generically detecting both known and unknown obfuscation techniques. Authors: Daniel Bohannon (@danielhbohannon) Lee Holmes (@Lee_Homes) Research Blog Post: https://www.fireeye.com/blog/threat-research/2017/07/revoke-obfuscation-powershell.html White Paper: https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/revoke-obfuscation-report.pdf

Revoke-Obfuscation v1.0 FAQ

Common questions about Revoke-Obfuscation v1.0 including features, pricing, alternatives, and user reviews.

Revoke-Obfuscation v1.0 is A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.. It is a Security Operations solution designed to help security teams with Threat Research, Security Research, Obfuscation.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Cyborg Security HUNTER Logo

Threat hunting platform with free hunt packages and educational resources.

0
CDI_yara Logo

A collection of YARA rules for public use, built from intelligence profiles and file work.

0
The Threat Hunter Playbook Logo

A community-driven open source project providing interactive notebooks with detection logic, adversary tradecraft, and resources organized according to MITRE ATT&CK framework for threat hunting and detection development.

0
Yara Rule Generator Logo

A tool for quick and effective Yara rule creation to isolate malware families and malicious objects.

0
Shotgunyara Logo

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox