vector-sec / TA_ETWLinks
Splunk Technology Add-On (TA) for collecting ETW events from Windows systems
☆17Updated 3 years ago
Alternatives and similar repositories for TA_ETW
Users that are interested in TA_ETW are comparing it to the libraries listed below
Sorting:
- PowerShell No Agent Hunting☆111Updated 7 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 8 years ago
- Sysmon configuration☆65Updated 7 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Updated 2 years ago
- Parser for Windows PowerShell script block logs☆100Updated last year
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆167Updated 7 years ago
- Invoke-LiveResponse☆150Updated 3 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Updated 5 years ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Updated 7 years ago
- Splunk app for Threat hunting☆15Updated 7 years ago
- Sysmon Tools for PowerShell☆232Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 8 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Updated 6 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆58Updated 3 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Updated 4 years ago
- Reconstruct process trees from event logs☆147Updated 5 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Updated 4 years ago
- Repository for my ATT&CK analysis research.☆70Updated 6 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- Sysmon Splunk App☆47Updated 7 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Updated 4 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated 2 years ago
- CB API scripts for IR, administration, etc.☆32Updated 6 years ago
- Office365 Log Analysis Framework☆81Updated 6 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Updated 7 years ago
- An Inofficial Sysmon Version History (Change Log)☆33Updated 5 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 5 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Updated 4 years ago