jonny-jhnson / TelemetrySourceLinks
☆247Updated last year
Alternatives and similar repositories for TelemetrySource
Users that are interested in TelemetrySource are comparing it to the libraries listed below
Sorting:
- ☆223Updated 4 months ago
- ☆201Updated 7 months ago
- Active C&C Detector☆154Updated last year
- Event Tracing For Windows (ETW) Resources☆387Updated 8 months ago
- Elastic Security Labs releases☆67Updated 2 weeks ago
- Cobalt Strike Beacon configuration extractor and parser.☆153Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆240Updated 2 months ago
- A ProcessMonitor visualization application written in rust.☆180Updated last year
- Sysmon-Like research tool for ETW☆353Updated 2 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆175Updated 2 years ago
- YARA rule analyzer to improve rule quality and performance☆101Updated last month
- ☆158Updated last month
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆331Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆171Updated this week
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆144Updated 3 months ago
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆154Updated last year
- ☆216Updated 2 years ago
- ☆25Updated 2 years ago
- A collection of tools, scripts and personal research☆128Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- ☆131Updated last week
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated 2 years ago
- ☆69Updated 3 months ago
- ☆189Updated 2 years ago
- Sigma rules to share with the community☆122Updated 4 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 2 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆78Updated 3 weeks ago
- Active Directory Purple Team Playbook☆108Updated 2 years ago