mr-r3b00t / parse_win_logView external linksLinks
☆14Aug 21, 2022Updated 3 years ago
Alternatives and similar repositories for parse_win_log
Users that are interested in parse_win_log are comparing it to the libraries listed below
Sorting:
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆34Jan 7, 2026Updated last month
- Unpacking and decryption tools for the Emotet malware☆45Dec 5, 2021Updated 4 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 4 years ago
- A Windows script to monitor registry hives for modifications & notify you when modifications have occured.☆23Oct 28, 2019Updated 6 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- IOC Collection 2022☆57Mar 7, 2023Updated 2 years ago
- ☆22Jul 7, 2023Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- EDRcoin source☆10Mar 23, 2016Updated 9 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- ATHERCRC32 Provide developers with a complete framework for using CRC32 in functions/classes in memory, and protecting your software agai…☆15Jan 29, 2021Updated 5 years ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆33Feb 2, 2026Updated last week
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- Library of threat hunts to get any user started!☆48Sep 4, 2020Updated 5 years ago
- BITS Transfers Manager☆45May 18, 2025Updated 8 months ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago