RomaissaAdjailia / Get-AppLockerEventlogLinks
This is a repo for fetching Applocker event log by parsing the win-event log
☆31Updated 3 years ago
Alternatives and similar repositories for Get-AppLockerEventlog
Users that are interested in Get-AppLockerEventlog are comparing it to the libraries listed below
Sorting:
- ☆45Updated 2 years ago
- ☆86Updated 3 years ago
- Default Detections for EDR☆96Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- ☆15Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- ☆14Updated 3 years ago
- ☆23Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Hundred Days of Yara Challenge☆12Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- General Content☆26Updated last year
- blame Huy☆42Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated 2 months ago
- Yara Rules for Modern Malware☆78Updated last year
- Bloodhound Portable for Windows☆53Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- ShellSweeping the evil.☆53Updated last year
- ☆33Updated 3 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- ☆18Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago