Monitor WMI consumers and processes, detecting potential malicious activity. This PowerShell script monitors WMI consumers and processes, detecting potential malicious activity. **Usage:** 1. Run PowerShell as administrator. 2. Import the WMIMonitor.ps1 module. 3. Create a new event subscriber. 4. Test the process call create function. 5. Check the Application Event log for EID 8. **Disable logging:** 1. Open an Administrator PS shell. 2. Run Remove-SubscriberMonitor. 3. Confirm the event subscriber and all associated WMI objects have been successfully removed.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A software tool that enhances visibility and control over application activities on a user's computer, helping to identify and prevent potential security threats.
A comprehensive utility that shows what programs are configured to run during system bootup or login, and when you start various built-in Windows applications.
A cross-platform security application that functions as a laptop kill cord, automatically locking or shutting down your computer when physically separated from you via a USB connection.
Comprehensive cybersecurity platform for hybrid and multi-cloud environments
A modern tool for Windows kernel exploration and observability with a focus on security.
Powerfully simple endpoint security solution that takes down threats without interrupting business.
A static analysis framework for extracting key characteristics from various file formats
YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.
Acronis Cyber Protect is an integrated cybersecurity and data protection platform that provides comprehensive protection for businesses, service providers, and individuals.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.