From asi
Detects PowerShell Empire artifacts in Windows event logs via Base64 launcher patterns, stager IOCs, module signatures, user agents, and staging URLs in Script Block Logging. For threat hunting and forensics.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
PowerShell Empire is a post-exploitation framework consisting of listeners, stagers, and agents. Its artifacts leave detectable traces in Windows event logs, particularly PowerShell Script Block Logging (Event ID 4104) and Module Logging (Event ID 4103). This skill analyzes event logs for Empire's default launcher string (`powershell -noP -sta -w 1 -enc`), Base64 encoded payloads containing `Sy...
Detects PowerShell Empire artifacts in Windows event logs via Base64 launchers, stager IOCs, module signatures, user agents, and staging URLs in Script Block Logging.
Detects PowerShell Empire artifacts in Windows event logs (4103/4104) via Base64 stagers, module signatures like Invoke-Mimikatz, User-Agents, and C2 URLs. Outputs JSON with IOCs, timelines, MITRE mappings for threat hunting.
Parses Windows EVTX files for malicious PowerShell via Event 4104/4103 logs, detecting AMSI bypasses, obfuscated commands, encoded payloads, credential dumping, and download cradles. For threat hunting and incident analysis.
Share bugs, ideas, or general feedback.
PowerShell Empire is a post-exploitation framework consisting of listeners, stagers, and agents. Its artifacts leave detectable traces in Windows event logs, particularly PowerShell Script Block Logging (Event ID 4104) and Module Logging (Event ID 4103). This skill analyzes event logs for Empire's default launcher string (powershell -noP -sta -w 1 -enc), Base64 encoded payloads containing System.Net.WebClient and FromBase64String, known module invocations (Invoke-Mimikatz, Invoke-Kerberoast, Invoke-TokenManipulation), and staging URL patterns.
powershell -noP -sta -w 1 -enc followed by Base64 blobSystem.Net.WebClient, DownloadData, DownloadString, FromBase64String/login/process.php, /admin/get.php and similar default URI patternsJSON report with matched IOCs, decoded Base64 payloads, timeline of suspicious events, MITRE ATT&CK technique mappings, and severity scores.