Powershell Threat Hunting Module
☆290Sep 21, 2016Updated 9 years ago
Alternatives and similar repositories for PSHunt
Users that are interested in PSHunt are comparing it to the libraries listed below
Sorting:
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,850Nov 17, 2021Updated 4 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆493Jul 29, 2017Updated 8 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Dec 10, 2018Updated 7 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 6 years ago
- CyLR - Live Response Collection Tool☆711Jun 1, 2022Updated 3 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆481Nov 15, 2024Updated last year
- ☆2,388Oct 14, 2023Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,138Oct 19, 2025Updated 4 months ago
- ☆309Aug 14, 2020Updated 5 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Incident Response Methodologies☆1,018Aug 2, 2018Updated 7 years ago
- A repository for using windows event forwarding for incident detection and response☆1,296Sep 8, 2025Updated 5 months ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- Utilities for Sysmon☆1,574Sep 21, 2025Updated 5 months ago
- PowerShell - Rapid Response... For the incident responder in you!☆304Oct 10, 2019Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- A repository of sysmon configuration modules☆2,980Aug 21, 2024Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,036May 27, 2020Updated 5 years ago
- ☆1,092May 1, 2019Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Feb 28, 2018Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆893Aug 20, 2021Updated 4 years ago
- PoshSec PowerShell Module☆160May 27, 2018Updated 7 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Simulates common user behaviour on local and remote Windows hosts.☆281Apr 29, 2018Updated 7 years ago