Yamato-Security / WELALinks
Windows Event Log Auditor
☆49Updated this week
Alternatives and similar repositories for WELA
Users that are interested in WELA are comparing it to the libraries listed below
Sorting:
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- Evtx Log (xml) Browser☆55Updated 2 years ago
- PowerShell Script Analyzer☆70Updated 2 years ago
- ☆80Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated last month
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Living off the False Positive!☆40Updated 9 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago
- Hundred Days of Yara Challenge☆12Updated 3 years ago
- Linux Evidence Acquisition Framework☆118Updated last year
- Baseline a Windows System against LOLBAS☆68Updated last year
- Initial triage of Windows Event logs☆102Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆117Updated 2 years ago
- Default Detections for EDR☆96Updated last year
- Detection rule validation☆40Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆18Updated last year
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆62Updated 10 months ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆25Updated last year