microsoft / SysmonForLinux
Sysmon for Linux
☆1,790Updated this week
Alternatives and similar repositories for SysmonForLinux:
Users that are interested in SysmonForLinux are comparing it to the libraries listed below
- Open Source EDR for Windows☆1,168Updated last year
- Open EDR public repository☆2,324Updated last year
- The Linux port of the Sysinternals Sysmon tool.☆253Updated 2 months ago
- AVML - Acquire Volatile Memory for Linux☆895Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,022Updated this week
- Elastic Security detection content for Endpoint☆1,084Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,996Updated 2 weeks ago
- A repository of sysmon configuration modules☆2,700Updated 4 months ago
- Utilities for Sysmon☆1,496Updated 7 months ago
- YARA signature and IOC database for my scanners and tools☆2,525Updated last month
- Digging Deeper....☆3,058Updated this week
- An Active Defense and EDR software to empower Blue Teams☆1,249Updated last year
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆837Updated 2 years ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆945Updated last month
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,277Updated 2 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,408Updated last week
- Windows Events Attack Samples☆2,286Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,712Updated last month
- The multi-platform memory acquisition tool.☆719Updated last month
- UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of …☆838Updated this week
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆774Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,804Updated 9 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,800Updated 6 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,507Updated 6 months ago
- Detect Tactics, Techniques & Combat Threats☆2,091Updated last week
- TrustedSec Sysinternals Sysmon Community Guide☆1,163Updated 7 months ago
- ReversingLabs YARA Rules☆780Updated last month
- Malware Configuration And Payload Extraction☆2,109Updated this week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆556Updated this week
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,774Updated last year