WMI Monitor Logo

WMI Monitor

0
Free
Visit Website

Monitor WMI consumers and processes, detecting potential malicious activity. This PowerShell script monitors WMI consumers and processes, detecting potential malicious activity. **Usage:** 1. Run PowerShell as administrator. 2. Import the WMIMonitor.ps1 module. 3. Create a new event subscriber. 4. Test the process call create function. 5. Check the Application Event log for EID 8. **Disable logging:** 1. Open an Administrator PS shell. 2. Run Remove-SubscriberMonitor. 3. Confirm the event subscriber and all associated WMI objects have been successfully removed.

FEATURES

ALTERNATIVES

A collection of scripts to harden Windows 10 security and privacy

A library to access and parse the Microsoft Internet Explorer Cache File format.

CrowdStrike Falcon Insight XDR is an AI-powered endpoint detection and response solution that provides comprehensive protection, visibility, and automated response capabilities.

A Python library for loading and executing Beacon Object Files (BOFs) in-memory.

GravityZone is a unified endpoint security and analytics platform that provides risk assessment, threat prevention, and incident response capabilities.

OSSEC is a versatile HIDS known for its powerful log analysis and intrusion detection capabilities.

AhnLab PLUS is a unified security platform providing comprehensive cybersecurity solutions for businesses.

A modern tool for Windows kernel exploration and observability with a focus on security.