Windows Security Logging
☆43Jul 17, 2022Updated 3 years ago
Alternatives and similar repositories for QLOG
Users that are interested in QLOG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transform Linux Audit logs for SIEM usage☆821Mar 5, 2026Updated 2 weeks ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated 2 weeks ago
- ☆13Nov 22, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- ☆14Aug 16, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- ☆18Mar 26, 2024Updated last year
- ZAP test code☆14May 7, 2015Updated 10 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- ☆20May 10, 2023Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- ☆10Oct 25, 2020Updated 5 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago