microsoft / SysmonForLinuxLinks
Sysmon for Linux
☆1,975Updated 3 months ago
Alternatives and similar repositories for SysmonForLinux
Users that are interested in SysmonForLinux are comparing it to the libraries listed below
Sorting:
- Open Source EDR for Windows☆1,277Updated 2 years ago
- Elastic Security detection content for Endpoint☆1,304Updated this week
- Digging Deeper....☆3,501Updated this week
- The multi-platform memory acquisition tool.☆855Updated 4 months ago
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,868Updated last week
- AVML - Acquire Volatile Memory for Linux☆1,000Updated this week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,380Updated 11 months ago
- A repository of sysmon configuration modules☆2,884Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,305Updated 2 years ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,152Updated last week
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,041Updated last week
- Utilities for Sysmon☆1,550Updated 3 weeks ago
- The Linux port of the Sysinternals Sysmon tool.☆276Updated 3 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,327Updated last week
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆963Updated last month
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,842Updated this week
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- Windows Events Attack Samples☆2,426Updated 2 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,247Updated last week
- ReversingLabs YARA Rules☆861Updated 3 weeks ago
- Malware Configuration And Payload Extraction☆2,724Updated this week
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,211Updated 2 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,763Updated last week
- Open EDR public repository☆2,539Updated last year
- Indicators of Compromises (IOC) of our various investigations☆1,859Updated 2 weeks ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆855Updated 3 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,334Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,904Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,999Updated last month
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆769Updated 3 months ago