mr-r3b00t / parse_win_log
☆14Updated 2 years ago
Alternatives and similar repositories for parse_win_log:
Users that are interested in parse_win_log are comparing it to the libraries listed below
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆32Updated last year
- ☆14Updated 10 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆15Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆26Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 9 months ago
- ☆27Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- This repository provides a comprehensive collection of detection rules and threat intelligence focused on malicious Chrome extensions sup…☆8Updated 2 months ago
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- ☆19Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- 🏴☠️ BST is an ever-evolving collection of 🛠 tools to help in security and administration tasks 😉☆11Updated 3 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year