neu5ron / WinLogsZero2HeroLinks
This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.
☆22Updated 7 years ago
Alternatives and similar repositories for WinLogsZero2Hero
Users that are interested in WinLogsZero2Hero are comparing it to the libraries listed below
Sorting:
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- Sysmon configuration☆65Updated 6 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆24Updated 9 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Updated 10 years ago
- incident response scripts☆19Updated 6 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- ☆36Updated 8 years ago
- ☆39Updated 5 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆42Updated 6 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- Sysmon configuration file template with default high-quality event tracing☆17Updated 4 years ago
- ☆52Updated 6 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 10 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Tool to parse SRU database☆24Updated 7 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13Updated 7 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Updated 7 years ago
- ☆32Updated 6 months ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Tools to search through massive amounts of data☆21Updated 7 months ago
- Community Sharing Repository for Carbon Black and Bit9 Platforms☆27Updated 3 years ago