ANSSI-FR / WAADLinks
Détection d'anomalie à partir des journaux d'authentification Windows
☆18Updated 4 years ago
Alternatives and similar repositories for WAAD
Users that are interested in WAAD are comparing it to the libraries listed below
Sorting:
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated 6 months ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- Configurations for DFIR ORC☆28Updated last year
- Random hunting ordiented yara rules☆97Updated 2 years ago
- ☆45Updated 2 years ago
- Yara Based Detection Engine for web browsers☆49Updated 3 years ago
- Malware similarity platform with modularity in mind.☆78Updated 4 years ago
- A rewrite of mactime, a bodyfile reader☆40Updated last year
- ☆23Updated 2 years ago
- The core backend server handling API requests and task management☆46Updated this week
- A YARA Rule Performance Measurement Tool☆60Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆65Updated 2 years ago
- XOR Key Extractor☆50Updated last year
- ☆88Updated last month
- Standardized Malware Analysis Tool☆54Updated 4 years ago
- Manipulate timestamps on NTFS☆52Updated 10 years ago
- Valhalla API Client☆70Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Yara rules☆22Updated 2 years ago
- Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and th…☆52Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Carves and recreates VSS catalog and store from Windows disk image.☆99Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 6 years ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Miscellaneous Scripts☆17Updated 4 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago