Pushes Sysmon Configs
☆90Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for SysmonConfigPusher
Users that are interested in SysmonConfigPusher are comparing it to the libraries listed below
Sorting:
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 2 years ago
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 4 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆863Jan 20, 2022Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆252Jun 7, 2025Updated 8 months ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆573Jan 21, 2026Updated last month
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 9 months ago
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- ☆19Oct 23, 2020Updated 5 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 5 months ago
- ☆265Oct 25, 2025Updated 4 months ago
- Transform Linux Audit logs for SIEM usage☆812Updated this week
- TrustedSec Sysinternals Sysmon Community Guide☆1,370Feb 10, 2026Updated 2 weeks ago
- Presentations from Conferences☆31Sep 14, 2024Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Sep 18, 2022Updated 3 years ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆336Aug 7, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A wireshark plugin to instrument ETW☆580Jan 28, 2022Updated 4 years ago