georgi-i / winevt_logs_analysisView external linksLinks
Searching .evtx logs for remote connections
☆24Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for winevt_logs_analysis
Users that are interested in winevt_logs_analysis are comparing it to the libraries listed below
Sorting:
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Aug 5, 2022Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Interact with Windows RPC Services over SMB using go-smb☆11Nov 18, 2025Updated 2 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Dec 7, 2025Updated 2 months ago
- ☆80Apr 18, 2023Updated 2 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 2 months ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆133Jan 25, 2023Updated 3 years ago
- A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor☆34Nov 17, 2022Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 6 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Oct 29, 2025Updated 3 months ago
- ShootCutMe an .LNK file creator tool for redteamer☆15Oct 2, 2024Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Oct 1, 2022Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Jun 23, 2023Updated 2 years ago