Blumira / Flowmira
Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-actions.
☆18Updated 3 years ago
Alternatives and similar repositories for Flowmira:
Users that are interested in Flowmira are comparing it to the libraries listed below
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 4 months ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆216Updated 2 weeks ago
- Unleash the power of the Falcon Platform at the CLI☆115Updated 2 weeks ago
- Repository of SentinelOne Deep Visibility queries.☆122Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆200Updated 2 months ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- ☆68Updated 11 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 4 years ago
- ☆54Updated 3 years ago
- PerchLabs threat feed☆16Updated 3 years ago
- InsightVM helpful SQL queries☆64Updated this week
- ☆83Updated last month
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- ☆26Updated 3 years ago
- 2021 SANS DFIR Summit: Greppin' Logs☆21Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- LogRhythm PowerShell Toolkit☆50Updated last month
- Real-time Response scripts and schema☆110Updated last year
- Defensive Origins Training Schedule☆37Updated last year
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆79Updated 4 years ago
- Collection of useful Canary tools☆75Updated this week
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 4 months ago
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆252Updated 4 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- Convert Sigma rules to LogRhythm searches☆20Updated 2 years ago
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- A PowerShell incident response script for quick triage☆78Updated 2 years ago