qbrusa / Windows-Security-Event-ID-HelperLinks
This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recommandations).
☆11Updated 2 years ago
Alternatives and similar repositories for Windows-Security-Event-ID-Helper
Users that are interested in Windows-Security-Event-ID-Helper are comparing it to the libraries listed below
Sorting:
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Updated 5 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆34Updated 3 years ago
- ☆73Updated last year
- ☆43Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated 2 years ago
- ☆50Updated last week
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 4 years ago
- ☆43Updated 2 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆17Updated 2 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆23Updated last year
- ☆70Updated last week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆103Updated 5 months ago
- ShellSweeping the evil.☆53Updated last year
- Azure AD Incident Response☆27Updated 4 years ago
- pySigma Splunk backend☆41Updated this week
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 4 years ago
- Pushes Sysmon Configs☆90Updated 4 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated 2 years ago
- Kerberoast Detection Script☆31Updated last year
- Random tips and tricks RE: ransomware☆14Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆49Updated 4 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated 2 months ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Updated 4 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Updated 2 years ago
- ☆44Updated 7 months ago