We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Potential CommandLine Obfuscation Using Unicode Characters
Process Deletion of Its Own Executable
Potential Active Directory Reconnaissance/Enumeration Via LDAP
Potential Credential Dumping Activity Via LSASS