☆13Feb 6, 2018Updated 8 years ago
Alternatives and similar repositories for Sysmon-Threat-Intel
Users that are interested in Sysmon-Threat-Intel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 9 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Postfix Add-on for Splunk (Compliant with the Mail CIM model)☆11Mar 18, 2021Updated 5 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- MITRE ATT&CK Framework compliance dashboard and correlation searches that works with Splunk Enterprise Security and ES Content Update☆30Nov 7, 2025Updated 4 months ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆168Dec 10, 2018Updated 7 years ago
- pySigma Splunk backend☆41Mar 22, 2026Updated last week
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- ☆16Aug 29, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Look into EDR events from network☆25Nov 20, 2025Updated 4 months ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- This is a python script that can be run on each Splunk Indexer for the purpose of exporting historical bucket data (raw events + metadata…☆12Jan 31, 2024Updated 2 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- An adapter which allows you to use FriendlyId with DataMapper☆16Oct 12, 2010Updated 15 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Push-button Security Operations Center using Kubernetes☆13Oct 19, 2016Updated 9 years ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- Essential playbooks & runbooks for cybersecurity operations. A dynamic resource for security pros to navigate digital threats, with best …☆15Apr 14, 2025Updated 11 months ago
- Use Faye on Heroku Cedar stack with RedisToGo☆39Jun 23, 2011Updated 14 years ago
- Custom Splunk search command to reconstruct a pstree from Sysmon process creation events (EventCode 1)☆24Mar 3, 2023Updated 3 years ago
- Framework for Detection Evaluation (F4DE) : set of evaluation tools for detection evaluations and for specific NIST-coordinated evaluatio…☆25Jul 6, 2017Updated 8 years ago
- ☆15Jan 10, 2019Updated 7 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Collection of various materials on operational security.☆24Nov 15, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Data Driven Threat Hunting on the RaspberryPi☆32Jan 26, 2022Updated 4 years ago
- a keep-alive agent for node http & https with a really snappy name☆32May 2, 2017Updated 8 years ago