Includes a smorgasbord of LogRhythm related utilities and scripts that are all 100% unofficial and should never be used by anyone, ever.
☆20Apr 12, 2018Updated 7 years ago
Alternatives and similar repositories for LR-Utilities
Users that are interested in LR-Utilities are comparing it to the libraries listed below
Sorting:
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Sysmon configuration file template with default high-quality event tracing☆20Jan 26, 2021Updated 5 years ago
- LogRhythm PowerShell Toolkit☆53Jan 2, 2026Updated 2 months ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Apr 13, 2020Updated 5 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- Complete translation (EN) of the leaked files related to Conti (chat)☆16Jan 19, 2023Updated 3 years ago
- SecurityCenter 5 API Scripts☆10Jan 17, 2019Updated 7 years ago
- One Identity Safeguard Web API C# SDK☆12Updated this week
- Overview of existing mappings from and to cyber security controls☆19Oct 30, 2023Updated 2 years ago
- ☆17Sep 30, 2020Updated 5 years ago
- Power Prompt - Enhance ChatGPT & OpenAi interaction. Seamless conversations. Choose models, save templates, set temp, length & tokens.☆19Feb 15, 2023Updated 3 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Nov 17, 2020Updated 5 years ago
- ☆39Mar 2, 2026Updated 2 weeks ago
- One Identity Safeguard PowerShell scripting resources☆24Updated this week
- ☆12Jul 15, 2022Updated 3 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- Webhook endpoint for Fireflies transcripts with intent detection☆20Nov 1, 2024Updated last year
- Check in your Point from the command line☆13Nov 11, 2018Updated 7 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- Tools for OSINT in Emirates☆25Apr 13, 2025Updated 11 months ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- Open YARA scan- and search engine☆26Feb 23, 2025Updated last year
- ☆28Updated this week
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- ☆18Dec 6, 2022Updated 3 years ago
- ☆16Oct 27, 2023Updated 2 years ago
- ☆12Jul 3, 2017Updated 8 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Operational Technology Cyber Attack Database☆51Jul 22, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- terminal client for openai's GPT completion APIs☆27Updated this week
- The XSS Hunter service - a portable version of XSSHunter.com☆27Nov 13, 2017Updated 8 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago