airbus-cert / Splunk-ETW
A Splunk Technology Add-on to forward filtered ETW events.
☆30Updated 4 years ago
Alternatives and similar repositories for Splunk-ETW:
Users that are interested in Splunk-ETW are comparing it to the libraries listed below
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- ☆39Updated 5 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆75Updated last week
- Publicly shareable windows event log message data☆27Updated 5 years ago
- ☆33Updated 4 months ago
- Random hunting ordiented yara rules☆95Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆56Updated 2 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆72Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆20Updated 3 years ago
- A repo for centralizing ongoing research on the new Windows 10/11 DFIR artifact, EventTranscript.db.☆39Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- ☆15Updated 4 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated 2 months ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- Site for IWS book content☆18Updated 6 years ago
- OSSEM Modular☆27Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Dashboards for conducting forensic investigation using windows events in Kibana☆17Updated 5 years ago
- Volatility plugins created by the author☆44Updated 9 years ago