View on GitHub

PowerShell-BlueTeam

PowerShell for Blue Team

logo

PowerShell-BlueTeam

This is just a collection of powershell functions that I will be turning into an Incident Response Module. Some of them I wrote myself, some I took snippets of code from other functions, and some are still in the testing and development stage.

The goal after all functions are created is to cover some digital forensics, some threat hunting, and some basic malware analysis. These techniques can be mapped back to the Mitre Attack Matrix for TTP chaining and to possibly help with attribution.

Importing

Import the data file:

Import-Module PowerShellBlueTeam.psd1

Syntax Examples

Local Memory Dumps:

Get-LocalMemDump -DestPath C:\Users\admin\Documents\user.dmp

Finding Obfuscated File Extensions:

Find-HiddenExes -DirPath C:\Windows -Recurse

Alternate Data Streams:

Read-AltDataStreams -DirectoryPath C:\Temp -Recurse

output