Windows Security Logging
☆43Jul 17, 2022Updated 3 years ago
Alternatives and similar repositories for QLOG
Users that are interested in QLOG are comparing it to the libraries listed below
Sorting:
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Transform Linux Audit logs for SIEM usage☆815Updated this week
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ZAP test code☆14May 7, 2015Updated 10 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- ☆13Nov 22, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Website defacement attack detection with deep learning☆62Jan 15, 2025Updated last year
- ☆19Aug 2, 2020Updated 5 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆18Jul 14, 2021Updated 4 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- ☆69Oct 6, 2021Updated 4 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Mar 25, 2024Updated last year
- ☆16Jul 19, 2021Updated 4 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- ☆19Sep 3, 2021Updated 4 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- Library of threat hunts to get any user started!☆49Sep 4, 2020Updated 5 years ago