Sysmon configuration file template with default high-quality event tracing
☆581Jan 21, 2026Updated 2 months ago
Alternatives and similar repositories for sysmon-config
Users that are interested in sysmon-config are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository of sysmon configuration modules☆3,007Aug 21, 2024Updated last year
- Documentation and scripts to properly enable Windows event logs.☆674Oct 3, 2025Updated 6 months ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,391Feb 10, 2026Updated last month
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,453Jul 3, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,497Apr 1, 2026Updated last week
- Sysmon configuration file templates with advanced event tracing and blocking☆41Updated this week
- Pushes Sysmon Configs☆90Jun 11, 2021Updated 4 years ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,097Mar 21, 2026Updated 2 weeks ago
- Utilities for Sysmon☆1,634Updated this week
- BlueHound - pinpoint the security issues that actually matter☆759Jul 12, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆825Nov 5, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,081Dec 11, 2024Updated last year
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last month
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Dec 6, 2025Updated 4 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated last month
- MAL-CL (Malicious Command-Line)☆324Jan 10, 2023Updated 3 years ago
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Elastic Security detection content for Endpoint☆1,394Apr 3, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,493Feb 18, 2026Updated last month
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,092Nov 8, 2025Updated 5 months ago
- ☆2,396Oct 14, 2023Updated 2 years ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆787Mar 25, 2026Updated 2 weeks ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,069Oct 5, 2023Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- Digging Deeper....☆3,869Updated this week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆618Dec 8, 2025Updated 4 months ago
- Detect and respond to Cobalt Strike beacons using ETW.☆515Jul 15, 2022Updated 3 years ago
- Automation scripts to deploy Windows Event Forwarding, Sysmon, and custom audit policies in an Active Directory environment.☆487Nov 21, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago