jstnk9 / ETW-Almulahaza
ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system
☆12Updated 2 years ago
Alternatives and similar repositories for ETW-Almulahaza:
Users that are interested in ETW-Almulahaza are comparing it to the libraries listed below
- ☆34Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ☆14Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆12Updated 4 years ago
- A set of tools for collecting forensic information☆26Updated 4 years ago
- Generate YARA rules for OOXML documents.☆38Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Yara rules☆20Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆13Updated last year
- Git for me to put all my forensics stuff☆21Updated last month
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 2 weeks ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- OSSEM Modular☆27Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Threat Mitigation Strategies☆25Updated last year
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- ☆15Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- ☆15Updated 4 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 5 years ago
- ☆27Updated 2 years ago