Koifman / LUMENView external linksLinks
Your Browser-based EVTX Companion
☆112Feb 6, 2026Updated last week
Alternatives and similar repositories for LUMEN
Users that are interested in LUMEN are comparing it to the libraries listed below
Sorting:
- SANS Holiday Hack Challenge write-up template☆29Nov 20, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆155Dec 5, 2025Updated 2 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 6 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆40Updated this week
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆25Oct 13, 2025Updated 4 months ago
- Manage and maintain Defender XDR custom collection configuration☆33Nov 19, 2025Updated 2 months ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Apr 22, 2025Updated 9 months ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- ☆50Jan 30, 2026Updated 2 weeks ago
- Hunt Smarter, Hunt Harder☆135Jan 12, 2026Updated last month
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆25Oct 22, 2025Updated 3 months ago
- ☆72Feb 4, 2026Updated last week
- An AWS IAM Privilege Escalation Path Library☆116Feb 2, 2026Updated last week
- ☆59Nov 13, 2024Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Jan 6, 2026Updated last month
- A tool for detecting VBA stomping.☆101Aug 4, 2022Updated 3 years ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- A PowerShell module for the Defender XDR portal☆63Feb 3, 2026Updated last week
- A Windows Event Log MCP☆39Aug 25, 2025Updated 5 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆53Sep 19, 2025Updated 4 months ago
- ☆139Sep 9, 2025Updated 5 months ago
- ☆26Jun 2, 2022Updated 3 years ago
- Detonate malware on VMs and get logs & detection status☆76Jan 29, 2026Updated 2 weeks ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 10 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆31Jan 26, 2024Updated 2 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Phishing scams are more rampant than ever — and I wanted to do something about it. Over the last few weeks, I’ve been working on a proje…☆17Sep 8, 2025Updated 5 months ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- Just another EDR killer☆94Jan 21, 2026Updated 3 weeks ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆216Sep 17, 2019Updated 6 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Jul 22, 2025Updated 6 months ago
- splunksecrets is a tool for working with Splunk secrets offline☆80Jun 5, 2025Updated 8 months ago
- ysoserial.net docker image☆28Sep 23, 2024Updated last year
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆711Dec 6, 2024Updated last year