bobby-tablez / Enable-All-The-LogsLinks
This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malware analysis. This can be used in production, however you might want to tune the GPO edits as needed.
☆33Updated 5 months ago
Alternatives and similar repositories for Enable-All-The-Logs
Users that are interested in Enable-All-The-Logs are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Baseline a Windows System against LOLBAS☆29Updated last year
- ☆19Updated 3 years ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 2 weeks ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- A C# based tool for analysing malicious OneNote documents☆116Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated last year
- Detection rule validation☆41Updated last year
- God Mode Detection Rules☆134Updated last year
- Initial triage of Windows Event logs☆102Updated last year
- ☆53Updated 3 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆71Updated 3 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- An exercise to practice deobfuscating PowerShell Scripts.☆26Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆145Updated 4 months ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆95Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆55Updated 3 months ago
- A list of RMMs designed to be used in automation to build alerts☆112Updated 5 months ago
- ☆53Updated 3 weeks ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- Full of public notes and Utilities☆127Updated 7 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year