Windows Security Logging
☆43Jul 17, 2022Updated 3 years ago
Alternatives and similar repositories for QLOG
Users that are interested in QLOG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Transform Linux Audit logs for SIEM usage☆824Mar 5, 2026Updated last month
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Linux Evidence Acquisition Framework☆119Sep 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated last month
- ☆13Nov 22, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- Python script for parsing ESET (NOD32) virlog.dat file.☆14Sep 28, 2017Updated 8 years ago
- High-level Threat Intelligence playbooks☆21Mar 6, 2021Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 10 months ago
- ☆14Aug 16, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Feb 14, 2020Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 11 months ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- ZAP test code