nasbench / EVTX-ETW-ResourcesLinks
Event Tracing For Windows (ETW) Resources
☆404Updated 3 weeks ago
Alternatives and similar repositories for EVTX-ETW-Resources
Users that are interested in EVTX-ETW-Resources are comparing it to the libraries listed below
Sorting:
- ☆254Updated last year
- ☆529Updated 4 months ago
- C# based evtx parser with lots of extras☆332Updated last month
- Sysmon-Like research tool for ETW☆368Updated 2 years ago
- View ETW Provider manifest☆541Updated 11 months ago
- ☆203Updated last year
- $MFT directory tree reconstruction & FILE record info☆314Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- Anything Sysmon related from the MSTIC R&D team☆156Updated last year
- ☆244Updated 4 months ago
- Sysmon configuration file template with default high-quality event tracing☆521Updated last month
- AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10☆124Updated 9 months ago
- Cobalt Strike Beacon configuration extractor and parser.☆157Updated 4 years ago
- A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare …☆181Updated this week
- Parses amcache.hve files, but with a twist!☆142Updated 9 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.☆206Updated last week
- Lnk Explorer Command line edition!!☆328Updated 9 months ago
- Elastic Security Labs releases☆81Updated last week
- MAL-CL (Malicious Command-Line)☆319Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆682Updated last week
- Encyclopedia for Executables☆456Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆154Updated 8 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆303Updated 3 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆593Updated 9 months ago
- ☆145Updated last week
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆313Updated last year
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆320Updated 5 months ago
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆392Updated 9 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated 7 months ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆294Updated 2 years ago