NextronSystems / simplesyslog
Simple SYSLOG client in Go
☆22Updated 9 months ago
Alternatives and similar repositories for simplesyslog:
Users that are interested in simplesyslog are comparing it to the libraries listed below
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Collect autorun records from running system☆61Updated 3 years ago
- ☆12Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- A golang implementation of a prefetch parser.☆19Updated 6 months ago
- event shipper for Carbon Black Defense notifications☆10Updated 2 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Old home of LimaCharlie, open source EDR☆30Updated last year
- Threat Mapping Catalogue☆17Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- OSSEM Modular☆27Updated 4 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Updated last year
- ☆33Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Live system forensic collector☆16Updated 2 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- ☆12Updated 6 years ago
- ☆44Updated last year
- ☆20Updated 4 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Incident Response Report Using GitHub-Sphinx☆20Updated 5 years ago