airbus-cert / etl-parserLinks
Event Trace Log file parser in pure Python
☆151Updated 5 years ago
Alternatives and similar repositories for etl-parser
Users that are interested in etl-parser are comparing it to the libraries listed below
Sorting:
- Random hunting ordiented yara rules☆98Updated 2 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Updated 7 months ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆73Updated last year
- Signature engine for all your logs☆173Updated 2 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆169Updated 5 months ago
- A repository that maps API calls to Sysmon Event ID's.☆121Updated 3 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 6 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆58Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Binary commandline executable to parse ETL files☆69Updated 7 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆216Updated 6 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Updated 6 years ago
- An Inofficial Sysmon Version History (Change Log)☆33Updated 5 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆64Updated 3 years ago
- VSCode extension for the YARA pattern matching language☆63Updated 2 years ago
- ☆46Updated 2 years ago
- A YARA Rule Performance Measurement Tool☆61Updated last year
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 6 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆82Updated 2 weeks ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 8 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- Yet another registry parser☆138Updated 3 years ago
- Publicly shareable windows event log message data☆28Updated 6 years ago
- Automatic YARA rule generation for Malpedia☆168Updated 3 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 7 years ago
- Windows link file (shortcuts) examiner☆68Updated last year
- An advanced memory forensics framework☆96Updated 6 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago