Sysmon EDR POC Build within Powershell to prove ability.
☆223May 1, 2021Updated 4 years ago
Alternatives and similar repositories for sysmon-edr
Users that are interested in sysmon-edr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source EDR for Windows☆1,296Feb 25, 2023Updated 3 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆218Sep 17, 2019Updated 6 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆794Updated this week
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Detect and respond to Cobalt Strike beacons using ETW.☆516Jul 15, 2022Updated 3 years ago
- Defences against Cobalt Strike☆1,297Jul 14, 2022Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,384Feb 10, 2026Updated last month
- Transform Linux Audit logs for SIEM usage☆821Mar 5, 2026Updated 3 weeks ago
- A repository of sysmon configuration modules☆2,996Aug 21, 2024Updated last year
- Utilities for Sysmon☆1,577Sep 21, 2025Updated 6 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆502Oct 8, 2021Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Signature engine for all your logs☆173Nov 13, 2023Updated 2 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆340Dec 3, 2025Updated 3 months ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆2,173Feb 21, 2023Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- All sysmon event types and their fields explained☆566Nov 13, 2021Updated 4 years ago
- Open EDR public repository☆2,623Jan 13, 2024Updated 2 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆823Nov 5, 2023Updated 2 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Public Repo for Atomic Test Harness☆285Apr 8, 2025Updated 11 months ago
- Investigate suspicious activity by visualizing Sysmon's event log☆430Dec 22, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆264Apr 24, 2021Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago