Yamato-Security / WELALinks
Windows Event Log Auditor
☆54Updated last week
Alternatives and similar repositories for WELA
Users that are interested in WELA are comparing it to the libraries listed below
Sorting:
- A small util to brute-force prefetch hashes☆78Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Open IOC sharing platform☆63Updated last year
- Evtx Log (xml) Browser☆55Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Dissect triage scripts for Citrix NetScaler devices☆66Updated last week
- PowerShell Script Analyzer☆70Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated last week
- Bloodhound Portable for Windows☆53Updated 2 years ago
- ShellSweeping the evil.☆53Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Linux Evidence Acquisition Framework☆118Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Initial triage of Windows Event logs☆103Updated last year
- Detection rule validation☆40Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- ☆80Updated 2 years ago
- Living off the False Positive!☆41Updated 10 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- ☆44Updated 4 months ago
- yara detection rules for hunting with the threathunting-keywords project☆153Updated 6 months ago
- Slides of my public talks☆56Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆35Updated 7 months ago
- Yara Rules for Modern Malware☆78Updated last year
- General Content☆26Updated 2 weeks ago
- Default Detections for EDR☆96Updated last year