mandiant / SilkETWLinks
☆784Updated 2 years ago
Alternatives and similar repositories for SilkETW
Users that are interested in SilkETW are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscation Detection Framework☆746Updated last year
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆824Updated 8 months ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆426Updated 4 years ago
- ☆523Updated 3 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆584Updated last year
- View ETW Provider manifest☆531Updated 10 months ago
- All sysmon event types and their fields explained☆556Updated 3 years ago
- ☆476Updated 2 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆518Updated 4 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆508Updated 3 years ago
- Tool Analysis Result Sheet☆355Updated 7 years ago
- Event Tracing For Windows (ETW) Resources☆398Updated 11 months ago
- Evade sysmon and windows event logging☆625Updated 5 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,233Updated last month
- ☆428Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,294Updated 2 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆924Updated last year
- C# based evtx parser with lots of extras☆323Updated last week
- Utilities for Sysmon☆1,544Updated 6 months ago
- Executes PowerShell from an unmanaged process☆502Updated 9 years ago
- A wireshark plugin to instrument ETW☆569Updated 3 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆808Updated last year
- Open Source EDR for Windows☆1,273Updated 2 years ago
- Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-Cradle…☆308Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆714Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Updated 2 years ago
- Live hunting of code injection techniques☆383Updated 6 years ago
- Misc Threat Hunting Resources☆374Updated 2 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆422Updated last year
- ☆1,104Updated last year