Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 10 additions & 2 deletions PS-SideLoadHunter/README.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,15 @@
SideLoadHunter-PS is a PowerShell script which will profile the endpoint for
DLLs and executables within user’s profiles, System32, and SysWow64. Once the
executables and DLLs have been profiled, comparative analysis is performed to
System32 and SysWow64 EXEs and DLLs that are not in their default location. Once
the executable and DLLs have been profiled, comparative analysis is performed to
identify possible evidence of DLL sideloading through file names, hash values,
and internal names. Additionally, program execution artifacts data are parsed
and analyzed for evidence of sideloaded executables that no longer exist on
disk.

By default, the script will scan Users, ProgramData, Intel, Recovery directories
for evidence of suspicious EXEs and DLLs. A specific directory can be specified
through the TargetDir parameter.

The main functions of SideLoadHunter are:

- Get-SideLoadDetect
Expand Down Expand Up @@ -37,4 +41,8 @@ administrator.

![](media/d78aff06c5247888ec422dbf40cafe9e.png)

To specifiy a specific directory to scan, use the TargetDir parameter:

![](media/5cf715b4b1ea5728aa3470441bebc704.png)

![](media/e13c52eb21f43d422d57c02ea9dcc8ff.png)
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading