An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal
☆205Apr 18, 2022Updated 4 years ago
Alternatives and similar repositories for SysmonHunter
Users that are interested in SysmonHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Explore Indicators of Compromise Automatically☆97Feb 27, 2020Updated 6 years ago
- Utilities for Sysmon☆1,637Apr 4, 2026Updated 3 weeks ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆940Dec 12, 2023Updated 2 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,075Nov 28, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,181Jul 26, 2023Updated 2 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆821Sep 4, 2019Updated 6 years ago
- Utilities for MITRE™ ATT&CK☆1,052Jan 3, 2026Updated 3 months ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆648Jan 18, 2026Updated 3 months ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆219Sep 17, 2019Updated 6 years ago
- AD Security Intrusion Detection System☆1,322Mar 31, 2023Updated 3 years ago
- 红队基础设施自动化部署工具☆852Jan 4, 2023Updated 3 years ago
- A simple web platform for WatchAD☆110May 1, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Oct 7, 2019Updated 6 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆810May 11, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,555Jan 24, 2023Updated 3 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆969Feb 28, 2026Updated 2 months ago
- Attack Detection☆1,359Aug 31, 2022Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Apr 30, 2019Updated 7 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Aug 21, 2019Updated 6 years ago
- A repository of sysmon configuration modules☆3,029Aug 21, 2024Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- A fake JDBC driver that allows OS command execution.☆126Oct 2, 2022Updated 3 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- A Java runtime information-gathering tool which uses the Java Attach API for information acquisition☆203Apr 26, 2021Updated 5 years ago
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,015Jul 3, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cyber Analytics Repository☆1,001May 16, 2025Updated 11 months ago
- Shellcode launcher utility☆478Feb 16, 2014Updated 12 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,974Apr 23, 2026Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,735Sep 23, 2025Updated 7 months ago
- Main Sigma Rule Repository☆10,355Apr 24, 2026Updated last week
- Apache Solr Injection Research☆581Jan 28, 2020Updated 6 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago