☆28Mar 29, 2022Updated 3 years ago
Alternatives and similar repositories for Log-Extractor
Users that are interested in Log-Extractor are comparing it to the libraries listed below
Sorting:
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Free's up wasted Microsoft Office 365 Licenses☆11Mar 29, 2022Updated 3 years ago
- roundrobin with configurable rotating strategies☆15Aug 21, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- ☆15Jan 9, 2026Updated 2 months ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- ☆13Feb 1, 2026Updated last month
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- Monitor internet facing resource for open ports #Blueteam☆14Apr 7, 2020Updated 5 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- ☆20May 30, 2025Updated 9 months ago
- ☆33Feb 26, 2022Updated 4 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Updated this week
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆158Nov 30, 2021Updated 4 years ago
- A PowerShell Module to create a Client and Server Named Pipe Server on Windows Systems☆11Aug 31, 2018Updated 7 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- ☆226Nov 9, 2023Updated 2 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- A PowerShell function to report admnistrative events☆16Mar 10, 2017Updated 9 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago