jurelou / epagneulLinks
Graph Visualization for windows event logs
☆238Updated 5 months ago
Alternatives and similar repositories for epagneul
Users that are interested in epagneul are comparing it to the libraries listed below
Sorting:
- ☆452Updated 3 years ago
- An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.☆489Updated 2 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆269Updated 4 years ago
- Incident Response - Fast suspicious file finder☆242Updated 3 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆369Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆167Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- Amplify network visibility from multiple POV of other hosts☆305Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆910Updated 3 years ago
- ☆667Updated 3 years ago
- ☆1,070Updated last year
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆332Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆928Updated 9 months ago
- Anything Sysmon related from the MSTIC R&D team☆153Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆170Updated this week
- Detect and respond to Cobalt Strike beacons using ETW.☆500Updated 2 years ago
- ☆545Updated last year
- Evtx to Splunk ingestor☆15Updated 3 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆297Updated 3 years ago
- ☆130Updated last year
- ☆160Updated last year
- ☆43Updated 2 years ago
- Scan installed EDRs and AVs on Windows☆585Updated last month
- Emulate and Dissect MSF and *other* attacks☆141Updated last year
- Setup scripts for my Malware Analysis VMs☆253Updated 3 years ago
- Active C2 IoCs☆99Updated 2 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆440Updated last year
- Live forensic artifacts collector☆167Updated 11 months ago
- Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon☆328Updated 3 years ago