The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.
☆10Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for sysmon2splunk
Users that are interested in sysmon2splunk are comparing it to the libraries listed below
Sorting:
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- source man pages for explainshell.com☆17Mar 10, 2026Updated last week
- SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy…☆13Oct 20, 2017Updated 8 years ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- ☆12Jun 3, 2022Updated 3 years ago
- Frontend for MalShare.com☆17Feb 15, 2026Updated last month
- Registry Miner☆14Apr 10, 2018Updated 7 years ago
- Registry Explorer bookmark definitions☆44Dec 19, 2024Updated last year
- A Flask-like µFramework for Gopher☆20Jul 18, 2025Updated 8 months ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- LinuxServer container for the Taisun Docker application☆13Feb 2, 2022Updated 4 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- ☆12Jun 3, 2023Updated 2 years ago
- ☆20Sep 23, 2018Updated 7 years ago
- Powerful Python tool to analyze PDF documents☆26May 15, 2022Updated 3 years ago
- geolocate ip addresses in IIS logs☆20Jan 8, 2025Updated last year
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- PowerShell script with WPF GUI for easy usage of Azure tasks during training. Deployment at your fingertips no matter if it is a azuredep…☆17Jan 8, 2025Updated last year
- The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they in…☆21Jun 5, 2018Updated 7 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Discover USB device history for a specific user☆23Dec 28, 2015Updated 10 years ago
- A set of Python scripts for finding threats in Office365☆49Mar 27, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- A script that turns a phrase into a one-time pad and series of numbers. It also creates an audio file reading the series of numbers, to r…☆12Nov 15, 2021Updated 4 years ago
- A yara based MCP Server☆23Updated this week
- ☆20Feb 25, 2020Updated 6 years ago
- Carve NTFS USN records from binary data☆27May 21, 2017Updated 8 years ago
- A fork of The Sleuthkit with Pooled Storage and APFS support. See https://www.youtube.com/watch?v=k1XPillJ7aw for more info and usage.☆27Oct 27, 2019Updated 6 years ago
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆37Apr 24, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆26Dec 22, 2025Updated 3 months ago
- Analyst Unknown Cyber Range - a micro web service framework☆26Mar 5, 2025Updated last year
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆11Oct 9, 2016Updated 9 years ago
- ☆23May 7, 2021Updated 4 years ago
- Observable Network Appliance for passive monitoring of a network☆17May 8, 2025Updated 10 months ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago