Query and report user logons relations from MS Windows Security Events
☆243Aug 9, 2018Updated 7 years ago
Alternatives and similar repositories for userline
Users that are interested in userline are comparing it to the libraries listed below
Sorting:
- ☆11Apr 28, 2017Updated 8 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- Metasploit Framework☆26Feb 10, 2026Updated last month
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- defplorex for BlackHat Arsenal☆116Jul 27, 2017Updated 8 years ago
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- Automatic firewall rule orchestator.☆82Sep 28, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆938Dec 12, 2023Updated 2 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆657Aug 19, 2019Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆494Jul 29, 2017Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Jul 17, 2020Updated 5 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆295Sep 30, 2023Updated 2 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Nov 17, 2020Updated 5 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆295Aug 1, 2023Updated 2 years ago
- Noddos client☆74Sep 11, 2019Updated 6 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,859Nov 17, 2021Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago