bobby-tablez / Enable-All-The-LogsLinks
This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malware analysis. This can be used in production, however you might want to tune the GPO edits as needed.
☆38Updated 9 months ago
Alternatives and similar repositories for Enable-All-The-Logs
Users that are interested in Enable-All-The-Logs are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 9 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated last week
- Initial triage of Windows Event logs☆105Updated last year
- Detection rule validation☆40Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆15Updated 6 months ago
- ☆52Updated 4 months ago
- ASR Configurator, Essentials and Atomic Testing☆98Updated 8 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 6 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆57Updated 7 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 8 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- ☆22Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 7 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- God Mode Detection Rules☆134Updated last year
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated 10 months ago
- ☆53Updated 2 months ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆75Updated 3 weeks ago
- Contains compiled binaries of Volatility☆37Updated 7 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago