high101bro / PoSh-EasyWinLinks
PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs
☆48Updated 9 months ago
Alternatives and similar repositories for PoSh-EasyWin
Users that are interested in PoSh-EasyWin are comparing it to the libraries listed below
Sorting:
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 4 years ago
- Invoke-LiveResponse☆149Updated 3 years ago
- ☆42Updated 2 years ago
- ☆77Updated 6 years ago
- ATT&CK Remote Threat Hunting Incident Response☆204Updated 9 months ago
- A PowerShell incident response script for quick triage☆80Updated 3 years ago
- Detection Ideas & Rules repository.☆179Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆75Updated last year
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆30Updated 5 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- ☆55Updated 4 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆166Updated 6 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆112Updated 5 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆35Updated 11 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Recon Hunt Queries☆78Updated 4 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago