joeavanzato / TrawlerView external linksLinks
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
☆324May 1, 2025Updated 9 months ago
Alternatives and similar repositories for Trawler
Users that are interested in Trawler are comparing it to the libraries listed below
Sorting:
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,048Dec 11, 2024Updated last year
- Documentation and scripts to properly enable Windows event logs.☆671Oct 3, 2025Updated 4 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆201Jan 4, 2024Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Dec 3, 2025Updated 2 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Feb 3, 2023Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Dec 23, 2025Updated last month
- Scan vulnerable drivers on Windows with loldrivers.io☆186Sep 11, 2023Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆196Feb 8, 2026Updated last week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- Extract C2 Traffic☆252Nov 25, 2024Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,369Oct 22, 2025Updated 3 months ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,400Nov 7, 2024Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,440Oct 12, 2025Updated 4 months ago
- ☆80Apr 18, 2023Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Oct 29, 2025Updated 3 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆633Aug 4, 2025Updated 6 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated 11 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆110Feb 6, 2026Updated last week
- Pushes Sysmon Configs☆90Jun 11, 2021Updated 4 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆329Jul 15, 2024Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆780Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,014Feb 4, 2026Updated last week
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- Carve file metadata from NTFS index ($I30) attributes☆70Feb 3, 2024Updated 2 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- This repo is about Active Directory Advanced Threat Hunting☆649Feb 17, 2025Updated 11 months ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆107Nov 23, 2022Updated 3 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆118Apr 4, 2023Updated 2 years ago
- ☆120Mar 28, 2025Updated 10 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Jan 18, 2023Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Jun 23, 2023Updated 2 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆282Aug 5, 2022Updated 3 years ago
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆659Jan 25, 2026Updated 3 weeks ago