jstnk9 / ETW-AlmulahazaLinks
ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system
☆13Updated 3 years ago
Alternatives and similar repositories for ETW-Almulahaza
Users that are interested in ETW-Almulahaza are comparing it to the libraries listed below
Sorting:
- ☆34Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Yara rules☆22Updated 2 years ago
- A set of tools for collecting forensic information☆26Updated 5 years ago
- ☆14Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Mass Triage Tools☆20Updated 4 months ago
- Repository for LNK stuff☆30Updated 2 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- ☆21Updated 3 months ago
- Threat Mitigation Strategies☆25Updated last year
- Generate YARA rules for OOXML documents.☆38Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆35Updated 2 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- ☆33Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 2 years ago
- ☆15Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 4 months ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- OSSEM Modular☆27Updated 4 years ago