Windows event log anomaly detection powered by ATPA technologies
☆26Dec 22, 2022Updated 3 years ago
Alternatives and similar repositories for APTAAnomaly
Users that are interested in APTAAnomaly are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Quick ESXi Log Parser☆30Oct 20, 2025Updated 5 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 7 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- USN Journal full path builder☆67Sep 16, 2024Updated last year
- ☆11Mar 12, 2021Updated 5 years ago
- ☆10Jul 17, 2025Updated 8 months ago
- Tools to assist in forensicating docker☆86Mar 5, 2025Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆43Sep 21, 2023Updated 2 years ago
- Compose file for andrespp/samba-ldap image☆12Feb 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- ☆80Feb 4, 2026Updated last month
- A Windows Event Log MCP☆42Aug 25, 2025Updated 7 months ago
- Python web app for previewing data in a Chrome Profile Folder☆24Jul 1, 2024Updated last year
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An open-source collection of API key rotation tutorials.☆78Feb 9, 2026Updated last month
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 4 years ago
- Powershell Module for the Sentinel One API☆12Jan 18, 2025Updated last year
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 4 years ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆301Mar 10, 2026Updated 2 weeks ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆24Mar 12, 2025Updated last year
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆23Oct 31, 2018Updated 7 years ago
- ☆24Jul 17, 2025Updated 8 months ago
- iOS Backup Examiner - A forensics tool for parsing an iOS backup's Info.plist file☆23Dec 5, 2016Updated 9 years ago
- Initial triage of Windows Event logs☆106Jun 16, 2024Updated last year