bannsec / winevt
Windows Event Interactions in Python
☆67Updated 2 months ago
Alternatives and similar repositories for winevt:
Users that are interested in winevt are comparing it to the libraries listed below
- ☆38Updated 4 years ago
- A simple python library to assist in working with cpes☆18Updated 11 months ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆115Updated 4 years ago
- Python bindings for https://github.com/omerbenamram/evtx/☆50Updated last month
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- Yara rules for detecting malware☆23Updated 4 months ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆138Updated 11 months ago
- Extract common Windows artifacts from source images and VSCs☆66Updated 3 years ago
- Repository of yara rules☆59Updated 2 years ago
- ☆17Updated 7 years ago
- ☆12Updated 3 years ago
- Python API wrapper for the Joe Sandbox API.☆64Updated 9 months ago
- A python library to extract TCP sessions from PCAPs.☆22Updated 4 years ago
- Pure Python parser for classic Windows Event Log files (.evt)☆48Updated last year
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆50Updated last year
- Parsing MITRE EDR Evaluation results☆12Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 4 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆42Updated 6 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆59Updated 6 years ago
- Automated OpenDXL Output information via IntelMQ☆14Updated 7 years ago
- Repository for all cbapi example scripts☆16Updated 6 years ago
- ☆33Updated 4 years ago
- Community modules for FAME☆65Updated 2 months ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆72Updated 6 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- Malware Sinkhole List in various formats☆102Updated 2 years ago
- Extract BITS jobs from QMGR queue and store them as CSV records☆74Updated 6 months ago