jonny-jhnson / JonMonLinks
☆246Updated 6 months ago
Alternatives and similar repositories for JonMon
Users that are interested in JonMon are comparing it to the libraries listed below
Sorting:
- ☆257Updated last year
- ☆211Updated last week
- ☆180Updated 7 months ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- A collection of tools, scripts and personal research☆146Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆139Updated 3 weeks ago
- Python tool to check rootkits in Windows kernel☆201Updated 3 months ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆37Updated last year
- Powershell Linter☆86Updated 3 weeks ago
- Repository of Yara Rules☆131Updated this week
- A C# based tool for analysing malicious OneNote documents☆118Updated 2 years ago
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆251Updated 2 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- Active C&C Detector☆156Updated 2 years ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Elastic Security Labs releases☆81Updated 2 weeks ago
- A collection of tools to interact with Microsoft Security Response Center API☆109Updated last year
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆159Updated 2 years ago
- Dump quarantined files from Windows Defender☆74Updated 3 years ago
- ☆26Updated 3 years ago
- Tools for analyzing EDR agents☆271Updated last year
- Retired TrustedSec Capabilities☆248Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 8 months ago
- A repository to share publicly available Velociraptor detection content☆191Updated this week
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆73Updated last month
- ☆20Updated 3 years ago
- ☆114Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆179Updated 6 months ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆195Updated 3 years ago