Tooling related to discovery of Cortex XDR canary files.
Honeypot1.ps1 - Powershell script to search for canary files, determine the Cyvera\Ransomware folder location a display all of the files.
CIA_IS_OK.ps1 - Powershell script that does the same as Honeypot1 but also tests against a directory to see which files can be safely encrypted. This has been neutered in the script but if you comment out a few lines it will XOR the files with 0xBB. You may want to add a small delay to avoid behavioural detection when smashing loads of files.
DirectoryComparison.java - Java script to show the difference between what Java and CMD see for directory contents
Issue was reported to Palo Alto but it was deemed a non issue as the Confidentiality, Integrity and Availibility of the agent was not impacted.
CIA is OK :/
Code is pretty rough, it is just a prototype POC - please run the CIA_IS_OK with $ErrorActionPreference = 'SilentlyContinue'
[TODO] - add blog post links.

