Skip to content

Audit Powershell and search from known keywords in history #Blueteam

Notifications You must be signed in to change notification settings

securethelogs/Bluechecker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 

Repository files navigation

Bluechecker

Bluechecker

BlueChecker will help you audit PowerShell and check for any suspicious activity. At the end it will then generate a report. Default location: C:\Temp\report.html

Simply download the script or run remotely using:

powershell –nop –c “iex(New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/securethelogs/Bluechecker/master/BlueChecker.ps1’)”

Once ran, BlueChecker will check for:

  • Powershell status
  • Evidence of downgrading
  • Registry and GP set for PowerShell auditing
  • Malicious scripts using keywords
  • Firewall spesific to Powershell
  • Event logs for Module logging and script block logging.

For More Information, visit: https://securethelogs.com/hacking-with-powershell-blue-team/

About

Audit Powershell and search from known keywords in history #Blueteam

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published