Pushes Sysmon Configs
☆90Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for SysmonConfigPusher
Users that are interested in SysmonConfigPusher are comparing it to the libraries listed below
Sorting:
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 3 years ago
- Documentation and scripts to properly enable Windows event logs.☆673Oct 3, 2025Updated 5 months ago
- Sysmon configuration file template with default high-quality event tracing☆577Jan 21, 2026Updated last month
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 10 months ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- ☆253Jun 7, 2025Updated 9 months ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 6 months ago
- ☆16Dec 7, 2025Updated 3 months ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- TrustedSec Sysinternals Sysmon Community Guide☆1,384Feb 10, 2026Updated last month
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- ☆18Sep 14, 2023Updated 2 years ago
- Powering Up Incident Response with Power-Response☆63Mar 5, 2020Updated 6 years ago
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- Transform Linux Audit logs for SIEM usage☆819Mar 5, 2026Updated 2 weeks ago
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- ☆265Oct 25, 2025Updated 4 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- A wireshark plugin to instrument ETW☆580Jan 28, 2022Updated 4 years ago
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Framework for generating audit commands for Unix security audits☆66Aug 1, 2023Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 3 months ago