Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity
☆95Feb 2, 2022Updated 4 years ago
Alternatives and similar repositories for Set-AuditRule
Users that are interested in Set-AuditRule are comparing it to the libraries listed below
Sorting:
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆32Nov 25, 2019Updated 6 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Nov 1, 2019Updated 6 years ago
- Open Source Security Events Metadata (OSSEM)☆1,289Feb 27, 2023Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated 2 months ago
- ☆17Jul 16, 2024Updated last year
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 3 months ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- [Fork] PowerSploit - A PowerShell Post-Exploitation Framework☆23Dec 27, 2022Updated 3 years ago
- AmsiScanBufferBypass using D/Invoke☆136Jun 17, 2021Updated 4 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- A PowerShell module to deploy active directory decoy objects.☆241Nov 17, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆83Mar 20, 2023Updated 3 years ago
- A repository for using windows event forwarding for incident detection and response☆1,300Sep 8, 2025Updated 6 months ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆356Nov 3, 2020Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A C# tool for enumerating remote access policies through group policy.☆73Apr 18, 2019Updated 6 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 6 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆293Aug 26, 2021Updated 4 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago