olafhartong / sysmon-modular-linux
A repository of Sysmon For Linux configuration modules
☆15Updated 3 years ago
Alternatives and similar repositories for sysmon-modular-linux:
Users that are interested in sysmon-modular-linux are comparing it to the libraries listed below
- ☆41Updated 9 months ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Library of threat hunts to get any user started!☆41Updated 4 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆40Updated 4 years ago
- General Content☆21Updated 6 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- ShellSweeping the evil.☆52Updated 7 months ago
- OSSEM Modular☆27Updated 4 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ☆26Updated 3 years ago
- ☆10Updated 5 years ago
- A list of Mitre Caldera compatible emulation-plans☆14Updated 3 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆73Updated last year
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆37Updated 3 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆29Updated 3 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated 3 months ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆25Updated last month
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆26Updated 7 months ago