Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.
☆64Apr 23, 2026Updated 2 weeks ago
Alternatives and similar repositories for Logmira
Users that are interested in Logmira are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Dec 16, 2020Updated 5 years ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- Really fast knock up use at own risk etc.☆18Mar 10, 2021Updated 5 years ago
- ☆18Jul 24, 2019Updated 6 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 4 years ago
- Control internet access with Windows Firewall☆13Nov 21, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated last month
- EventList☆379Mar 21, 2021Updated 5 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- DDTTX Tabletop Trainings☆28Sep 23, 2021Updated 4 years ago
- PerchLabs threat feed☆16Aug 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- A PowerShell module for querying the National Vulnerability Database☆26May 2, 2024Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆45Jun 6, 2022Updated 3 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- A simple tool designed to help in generation of group policy template files☆21Mar 20, 2024Updated 2 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The VulnCheck Github Action☆14Apr 2, 2026Updated last month
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 7 years ago
- This is a SecretManagement extension for 1Password.☆29Apr 8, 2025Updated last year
- TrustedSec Sysinternals Sysmon Community Guide☆1,411Feb 10, 2026Updated 2 months ago
- Imports install.wim files updated using the OSDBuilder Powershell tool☆28Feb 19, 2020Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆66Sep 9, 2020Updated 5 years ago
- clone of https://sourceforge.net/projects/eidauthenticate☆12Sep 24, 2019Updated 6 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- MerryMage's Ergodox Firmware (Fast I²C, NKRO)☆10Aug 8, 2021Updated 4 years ago
- ☆15Mar 18, 2025Updated last year
- Simulates common user behaviour on local and remote Windows hosts.☆281Apr 29, 2018Updated 8 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆64Dec 18, 2023Updated 2 years ago