Détection d'anomalie à partir des journaux d'authentification Windows
☆18Apr 16, 2021Updated 4 years ago
Alternatives and similar repositories for WAAD
Users that are interested in WAAD are comparing it to the libraries listed below
Sorting:
- Outil de triage automatisé de différents types de collectes d'artefacts.☆17Dec 8, 2025Updated 2 months ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Scripts to automate the creation of service accounts for Google Workspace migration products☆29Jan 6, 2026Updated last month
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- ☆23Apr 11, 2024Updated last year
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- WER Server☆19Feb 26, 2017Updated 9 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆275Jan 6, 2026Updated 2 months ago
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 5 months ago
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Feb 21, 2024Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- Internship (research) project for SURF. Process (Net)Flow data into Nmap scans.☆12Jun 7, 2022Updated 3 years ago
- An IDA processor for eBPF bytecode☆34May 17, 2017Updated 8 years ago
- Powershell module for VMWare vSphere forensics☆168Nov 8, 2024Updated last year
- ☆31Apr 20, 2016Updated 9 years ago
- deep file scanner tool☆41Aug 13, 2025Updated 6 months ago
- ☆12Feb 16, 2023Updated 3 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Tabbed navigation that you can swipe between, each tab can have its own ScrollView and maintain its own scroll position between swipes. …☆14Dec 6, 2018Updated 7 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago