nturley3 / zeek-kerberos-haters-guide
Kerberos Haters Guide to Zeek Threat Hunting
☆25Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for zeek-kerberos-haters-guide
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆40Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆88Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated last year
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 3 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆82Updated 4 months ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- ☆41Updated 7 months ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated last year
- ☆40Updated last year
- THOR MITRE ATT&CK Framework Coverage☆24Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆107Updated 5 years ago
- My conference presentations☆66Updated last year
- BloodHound Data Scanner☆44Updated 4 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- OSSEM Modular☆27Updated 4 years ago
- General Content☆20Updated 4 months ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- Kerberoast Detection Script☆30Updated 3 weeks ago
- A list of Mitre Caldera compatible emulation-plans☆14Updated 3 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated last year
- Publicly shareable windows event log message data☆27Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- incident response scripts☆18Updated 5 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Updated 4 years ago
- Threat Mitigation Strategies☆25Updated last year