☆28Mar 29, 2022Updated 3 years ago
Alternatives and similar repositories for Log-Extractor
Users that are interested in Log-Extractor are comparing it to the libraries listed below
Sorting:
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Run TTPs, with AI!☆71Updated this week
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 8 months ago
- roundrobin with configurable rotating strategies☆15Aug 21, 2023Updated 2 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- ☆20May 30, 2025Updated 9 months ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆33Feb 26, 2022Updated 4 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- ☆15Jan 9, 2026Updated last month
- Run python from a single exe☆35May 1, 2022Updated 3 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Jun 6, 2023Updated 2 years ago
- This repository is a collection of my malicious VBA projects.☆119Feb 13, 2021Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago