NVISOsecurity / evtx-hunterLinks
evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.
☆155Updated 3 years ago
Alternatives and similar repositories for evtx-hunter
Users that are interested in evtx-hunter are comparing it to the libraries listed below
Sorting:
- Blueteam operational triage registry hunting/forensic tool.☆149Updated 2 years ago
- ☆88Updated last week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆204Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- Blue Team detection lab created with Terraform and Ansible in Azure.☆162Updated 8 months ago
- A PowerShell incident response script for quick triage☆80Updated 3 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Active Directory Purple Team Playbook☆110Updated 2 years ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆186Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- Initial triage of Windows Event logs☆102Updated last year
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆201Updated 4 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆91Updated last month
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆134Updated last year
- Pushes Sysmon Configs☆88Updated 4 years ago
- Full of public notes and Utilities☆127Updated 5 months ago
- Powershell module for VMWare vSphere forensics☆153Updated 9 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆96Updated 2 years ago
- My conference presentations☆74Updated this week
- A python script developed to process Windows memory images based on triage type.☆263Updated last year
- Anything Sysmon related from the MSTIC R&D team☆154Updated last year
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆168Updated 2 years ago
- Sigma rules to share with the community☆121Updated 6 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆154Updated 2 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆134Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆88Updated 8 months ago
- Jupyter notebooks for threat hunting☆58Updated 4 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago