An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal
☆205Apr 18, 2022Updated 3 years ago
Alternatives and similar repositories for SysmonHunter
Users that are interested in SysmonHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Explore Indicators of Compromise Automatically☆97Feb 27, 2020Updated 6 years ago
- Utilities for Sysmon☆1,634Apr 4, 2026Updated last week
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,081Nov 28, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,176Jul 26, 2023Updated 2 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆821Sep 4, 2019Updated 6 years ago
- Utilities for MITRE™ ATT&CK☆1,049Jan 3, 2026Updated 3 months ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆647Jan 18, 2026Updated 2 months ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆218Sep 17, 2019Updated 6 years ago
- ☆35Jul 17, 2019Updated 6 years ago
- AD Security Intrusion Detection System☆1,322Mar 31, 2023Updated 3 years ago
- 红队基础设施自动化部署工具☆852Jan 4, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple web platform for WatchAD☆110May 1, 2023Updated 2 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆809May 11, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆969Feb 28, 2026Updated last month
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Apr 30, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- Junk code - needless to explain☆78Sep 10, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Aug 21, 2019Updated 6 years ago
- A repository of sysmon configuration modules☆3,007Aug 21, 2024Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- A fake JDBC driver that allows OS command execution.☆126Oct 2, 2022Updated 3 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- A Java runtime information-gathering tool which uses the Java Attach API for information acquisition☆203Apr 26, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,017Jul 3, 2018Updated 7 years ago
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- Cyber Analytics Repository☆995May 16, 2025Updated 10 months ago
- Shellcode launcher utility☆479Feb 16, 2014Updated 12 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,959Apr 5, 2026Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week