mdecrevoisier / Windows-authentication-brutforce-cheatsheetView external linksLinks
Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.
☆20Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for Windows-authentication-brutforce-cheatsheet
Users that are interested in Windows-authentication-brutforce-cheatsheet are comparing it to the libraries listed below
Sorting:
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22May 21, 2022Updated 3 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆60Jun 9, 2025Updated 8 months ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 7 months ago
- ☆14Jan 2, 2025Updated last year
- Windows Event Log Auditor☆88Updated this week
- ☆21Apr 19, 2024Updated last year
- ☆24Aug 21, 2023Updated 2 years ago
- ☆29Jan 9, 2025Updated last year
- Notes only☆19May 2, 2022Updated 3 years ago
- Sample evtx files to use for testing hayabusa detection rules☆64Nov 5, 2025Updated 3 months ago
- A multi-agent SOC/DFIR assistant powered by LangChain, LangGraph, and OpenAI models. Automates IOC extraction, MITRE ATT&CK mapping, CVE …☆65Jan 9, 2026Updated last month
- Windows Registry Knowledge Base☆195Dec 23, 2025Updated last month
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,089Nov 8, 2025Updated 3 months ago
- ☆34Aug 23, 2022Updated 3 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 5 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆412Nov 8, 2025Updated 3 months ago
- Collection of Dashboards for Threat Hunting and more!☆73Oct 17, 2020Updated 5 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- ☆73Oct 21, 2024Updated last year
- Content Repo for Demystifying KQL Tutorial Series☆72Sep 1, 2024Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Aug 19, 2024Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Jun 27, 2021Updated 4 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Mar 9, 2022Updated 3 years ago
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆84Jan 30, 2026Updated 2 weeks ago
- An opensource sigma conversion tool built using pysigma☆158Updated this week
- QRSS Plus: live QRSS grabbers from around the world