A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts
☆183Apr 17, 2026Updated 3 weeks ago
Alternatives and similar repositories for Blauhaunt
Users that are interested in Blauhaunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆616Updated this week
- ☆187Apr 24, 2025Updated last year
- A centralized and enhanced memory analysis platform☆524Mar 20, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆259Nov 24, 2023Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- DFIQ is a collection of investigative questions and the approaches for answering them☆307Mar 10, 2026Updated last month
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 10 months ago
- ☆570Mar 28, 2024Updated 2 years ago
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 7 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆93Aug 30, 2024Updated last year
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Live Feed of C2 servers, tools, and botnets☆772Apr 13, 2026Updated 3 weeks ago
- ☆33Feb 26, 2022Updated 4 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆869Jan 20, 2022Updated 4 years ago
- A repository to share publicly available Velociraptor detection content☆203Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,145Updated this week
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆154May 3, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,325Apr 16, 2026Updated 3 weeks ago
- ☆56Dec 13, 2025Updated 4 months ago
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆101May 2, 2026Updated last week
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆650Nov 7, 2025Updated 6 months ago
- A preconfigured Velociraptor triage collector☆76Updated this week
- Initial Access and Post-Exploitation Tool for Entra ID and M365 with a browser-based GUI☆1,284Apr 28, 2026Updated last week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆806Apr 6, 2026Updated last month
- ☆84Nov 21, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Canary Detection☆195Oct 20, 2025Updated 6 months ago
- ☆255Jun 7, 2025Updated 11 months ago
- BadZure automates the deployment of intentionally misconfigured Entra ID tenants and Azure subscriptions, populating them with diverse en…☆507Mar 4, 2026Updated 2 months ago
- ☆16May 3, 2024Updated 2 years ago
- ☆93Jul 30, 2025Updated 9 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆778Feb 3, 2023Updated 3 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year