crypt0jan / log4j-powershell-checkerLinks
log4j PowerShell Checker
☆18Updated 3 years ago
Alternatives and similar repositories for log4j-powershell-checker
Users that are interested in log4j-powershell-checker are comparing it to the libraries listed below
Sorting:
- Tools and scripts by Arctic Wolf☆69Updated 2 months ago
- ☆70Updated 2 years ago
- ☆115Updated 6 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated 5 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆37Updated 4 years ago
- MDE relies on some of the Audit settings to be enabled☆99Updated 3 years ago
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- Powershell Event Tracing Toolbox☆78Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆67Updated 4 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated 2 years ago
- Pushes Sysmon Configs☆88Updated 4 years ago
- My conference presentations☆84Updated 2 weeks ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆148Updated last year
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Jupyter notebooks☆25Updated 5 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.☆46Updated 5 years ago
- This script validates the most common Conditional Access policies in Microsoft 365.☆10Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆42Updated 2 years ago
- CrowdStrike Archive Scan Tool☆85Updated 3 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago