jsecurity101 / TelemetrySource
☆246Updated 11 months ago
Alternatives and similar repositories for TelemetrySource:
Users that are interested in TelemetrySource are comparing it to the libraries listed below
- ☆221Updated 3 months ago
- ☆201Updated 6 months ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆237Updated last month
- Active C&C Detector☆154Updated last year
- ☆68Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆142Updated 2 months ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆324Updated last year
- Cobalt Strike Beacon configuration extractor and parser.☆152Updated 3 years ago
- Event Tracing For Windows (ETW) Resources☆379Updated 7 months ago
- Sigma rules to share with the community☆120Updated 3 months ago
- YARA rule analyzer to improve rule quality and performance☆99Updated 3 weeks ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago
- ☆129Updated last month
- The Github project for The Defender's Guide by Luke Paine and Jonathan Johnson☆152Updated last year
- Elastic Security Labs releases☆63Updated last month
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 3 months ago
- A repository to share publicly available Velociraptor detection content☆163Updated this week
- A collection of tools, scripts and personal research☆128Updated last month
- ☆25Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆77Updated last year
- Sysmon-Like research tool for ETW☆352Updated 2 years ago
- ☆188Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- ☆156Updated 2 weeks ago
- Repository of Yara Rules☆110Updated 3 weeks ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆165Updated last month
- ☆216Updated 2 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆171Updated 2 years ago