From asi
Hunts MITRE ATT&CK T1098 account manipulation in Windows Security Event Logs by parsing event IDs for shadow admin creation, SID history injection, group changes, and credential modifications. Useful for threat hunting and SOC analysis.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
MITRE ATT&CK T1098 (Account Manipulation) covers adversary actions to maintain or expand access to compromised accounts, including adding credentials, modifying group memberships, SID history injection, and creating shadow admin accounts. This skill covers detecting these techniques through Windows Security Event Log analysis (Event IDs 4738, 4728, 4732, 4756, 4670, 5136), correlating group mem...
Hunts MITRE ATT&CK T1098 account manipulation via Windows Security Event Logs: parses Event IDs 4738/4728/4732, flags privileged group changes, shadow admins, SID history injection. Outputs JSON reports.
Hunts MITRE ATT&CK T1098 account manipulation in Windows security event logs using event IDs 4738, 4728, 4732, 4756. Detects shadow admin creation, SID history injection, privileged group changes, credential mods.
Detects DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests from non-domain-controller accounts. For threat hunting in Active Directory.
Share bugs, ideas, or general feedback.
MITRE ATT&CK T1098 (Account Manipulation) covers adversary actions to maintain or expand access to compromised accounts, including adding credentials, modifying group memberships, SID history injection, and creating shadow admin accounts. This skill covers detecting these techniques through Windows Security Event Log analysis (Event IDs 4738, 4728, 4732, 4756, 4670, 5136), correlating group membership changes with privilege escalation indicators, and identifying anomalous account modification patterns.
python-evtx, lxml librariesExtract Event IDs 4738 (user account changed), 4728/4732/4756 (member added to security groups), and 5136 (directory service object modified).
Flag additions to Domain Admins, Enterprise Admins, Schema Admins, Administrators, and Backup Operators groups.
Detect accounts receiving AdminSDHolder protection, direct privilege assignment, or SID history injection.
Cross-reference account changes with authentication events to identify initial compromise and persistence establishment.
JSON report with detected account manipulation events, privileged group changes, shadow admin indicators, and timeline correlation.