threathunting / sysmon-config
Sysmon configuration file template with default high-quality event tracing
☆11Updated 7 years ago
Alternatives and similar repositories for sysmon-config:
Users that are interested in sysmon-config are comparing it to the libraries listed below
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- incident response scripts☆19Updated 6 years ago
- OSSEM Modular☆27Updated 4 years ago
- Presentation Slides☆27Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- ☆14Updated 6 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Updated 9 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Updated 7 years ago
- Get all AD objects which are hidden from you☆18Updated 7 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆18Updated 5 years ago
- ☆17Updated 2 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- ☆30Updated 6 years ago
- PowerShell version of Fail2Ban☆13Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago