JohnLaTwC / MSRC
Scripts for interacting with MSRC portal data
☆77Updated 6 years ago
Alternatives and similar repositories for MSRC:
Users that are interested in MSRC are comparing it to the libraries listed below
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Updated 8 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Updated 4 years ago
- Sysmon configuration☆66Updated 6 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Windows PowerShell domain scanning tool☆54Updated 8 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 9 years ago
- ☆38Updated 9 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆48Updated 7 years ago
- ☆51Updated 6 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Updated 10 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆24Updated 8 years ago
- PS / Bash / Python / Other scripts For FUN!☆54Updated 2 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Some PowerShell Defensive Scripts☆127Updated 8 years ago
- ☆97Updated 8 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115Updated 7 years ago
- Domain Controller GPOs☆20Updated 7 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 3 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆43Updated 7 years ago
- Member Server GPOs☆20Updated 7 years ago
- ☆22Updated 8 years ago
- ☆59Updated 5 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- GPOs for client systems☆42Updated 5 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆17Updated 2 years ago
- Active Directory Group Policy analyzer☆99Updated 10 years ago
- ☆52Updated 6 years ago