Searching .evtx logs for remote connections
☆24Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for winevt_logs_analysis
Users that are interested in winevt_logs_analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Feb 27, 2026Updated last month
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- ☆19Jan 25, 2024Updated 2 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Mar 18, 2026Updated last week
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆254Oct 29, 2025Updated 4 months ago
- ☆12Jun 29, 2021Updated 4 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- wat☆14Feb 2, 2016Updated 10 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- ☆18May 3, 2021Updated 4 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆25Sep 3, 2024Updated last year
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆35Jan 7, 2026Updated 2 months ago