Query and report user logons relations from MS Windows Security Events
☆243Aug 9, 2018Updated 7 years ago
Alternatives and similar repositories for userline
Users that are interested in userline are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 28, 2017Updated 9 years ago
- Python script to decode common encoded PowerShell scripts☆216Jun 13, 2018Updated 7 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 9 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 3 months ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- defplorex for BlackHat Arsenal☆116Jul 27, 2017Updated 8 years ago
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- Automatic firewall rule orchestator.☆82Sep 28, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆636Jun 20, 2017Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆941Dec 12, 2023Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆507Oct 21, 2022Updated 3 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆493Jul 29, 2017Updated 8 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- 16,432 Free Yara rules created by☆389Jun 1, 2019Updated 6 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The Seeker of IOC☆132Oct 2, 2020Updated 5 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Jul 17, 2020Updated 5 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆297Sep 30, 2023Updated 2 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Nov 17, 2020Updated 5 years ago
- Powershell SAP assessment tool☆201Aug 13, 2018Updated 7 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 8 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆344Jun 25, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Dashboard to collect, analyze, and respond to reported phishing emails.☆295Aug 1, 2023Updated 2 years ago
- Noddos client☆74Sep 11, 2019Updated 6 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- Reconstruct process trees from event logs☆148Aug 12, 2020Updated 5 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆211Sep 15, 2021Updated 4 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,867Nov 17, 2021Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,455Nov 20, 2025Updated 6 months ago