Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring
☆117Oct 14, 2025Updated 4 months ago
Alternatives and similar repositories for Audix
Users that are interested in Audix are comparing it to the libraries listed below
Sorting:
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- EventList☆377Mar 21, 2021Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 11 months ago
- ☆349Mar 19, 2021Updated 4 years ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- Windows 10 (v1803+) ActivitiesCache.db parsers (SQLite, PowerShell, .EXE)☆196Feb 16, 2023Updated 3 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 7 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hard…☆201Mar 27, 2021Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,372Feb 10, 2026Updated 3 weeks ago
- ☆85Feb 1, 2022Updated 4 years ago
- Logging Made Easy☆710Nov 1, 2023Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆299Oct 2, 2019Updated 6 years ago
- A collection of some Powershell scripts and functions for building lab-environments☆19Feb 25, 2023Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- All sysmon event types and their fields explained☆566Nov 13, 2021Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Timeline of Active Directory changes with replication metadata☆520Mar 21, 2025Updated 11 months ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆150May 29, 2020Updated 5 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,338Dec 13, 2022Updated 3 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- Some .ps1 scripts for pentesting☆140Jan 6, 2026Updated last month
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Use PowerShell DSC resources as imperative functions.☆11Sep 30, 2017Updated 8 years ago