realparisi / WMI_Monitor
Log newly created WMI consumers and processes to the Windows Application event log
☆124Updated 7 years ago
Alternatives and similar repositories for WMI_Monitor
Users that are interested in WMI_Monitor are comparing it to the libraries listed below
Sorting:
- Sysmon Tools for PowerShell☆229Updated 6 years ago
- SysmonX - An Augmented Drop-In Replacement of Sysmon☆214Updated 5 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆165Updated 6 years ago
- ☆350Updated 4 years ago
- Parser for Windows PowerShell script block logs☆95Updated 9 months ago
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- Reconstruct process trees from event logs☆146Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆109Updated 6 years ago
- ☆53Updated 6 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆368Updated 6 years ago
- Powershell Threat Hunting Module☆283Updated 8 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- A repository that maps API calls to Sysmon Event ID's.☆120Updated 2 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- Some PowerShell Stuff☆281Updated 2 years ago
- Invoke-LiveResponse☆147Updated 3 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago
- ☆276Updated 2 years ago
- ☆257Updated 5 months ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆56Updated 3 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆156Updated 3 years ago
- Sysmon configuration☆65Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆170Updated 2 months ago
- Simulating Adversary Operations☆93Updated 7 years ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Updated 4 years ago
- A tool for de-obfuscating PowerShell scripts☆68Updated 6 years ago
- ☆164Updated 4 years ago