jklepsercyber / defender-detectionhistory-parser
A parser of Windows Defender's DetectionHistory forensic artifact, containing substantial info about quarantined files and executables.
☆109Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for defender-detectionhistory-parser
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆49Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆68Updated last year
- YARA rule analyzer to improve rule quality and performance☆93Updated 11 months ago
- ☆85Updated 9 months ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- Full of public notes and Utilities☆86Updated this week
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆90Updated 2 years ago
- A PowerShell incident response script for quick triage☆75Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆76Updated last week
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆64Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆119Updated this week
- ☆1Updated 3 weeks ago
- ☆187Updated 3 weeks ago
- Remote access and Antivirus Logging Database☆41Updated 6 months ago
- USN Journal full path builder☆36Updated 2 months ago
- ☆37Updated 2 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Active C&C Detector☆150Updated last year
- This repo is where I store my Threat Hunting ideas/content☆85Updated last year
- ☆61Updated last month
- An exercise to practice deobfuscating PowerShell Scripts.☆28Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆94Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆34Updated last year
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆35Updated 11 months ago
- ☆222Updated 6 months ago
- Blueteam operational triage registry hunting/forensic tool.☆142Updated last year
- Script for parsing Symantec Endpoint Protection logs, VBNs, and ccSubSDK database.☆63Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆79Updated 3 months ago
- MDE relies on some of the Audit settings to be enabled☆97Updated 2 years ago