Sysmon EDR POC Build within Powershell to prove ability.
☆223May 1, 2021Updated 4 years ago
Alternatives and similar repositories for sysmon-edr
Users that are interested in sysmon-edr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source EDR for Windows☆1,296Feb 25, 2023Updated 3 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆218Sep 17, 2019Updated 6 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆794Updated this week
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Detect and respond to Cobalt Strike beacons using ETW.☆516Jul 15, 2022Updated 3 years ago
- Defences against Cobalt Strike☆1,297Jul 14, 2022Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,384Feb 10, 2026Updated last month
- Transform Linux Audit logs for SIEM usage☆821Mar 5, 2026Updated 3 weeks ago
- A repository of sysmon configuration modules☆2,996Aug 21, 2024Updated last year
- Utilities for Sysmon☆1,577Sep 21, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆502Oct 8, 2021Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Signature engine for all your logs☆173Nov 13, 2023Updated 2 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.