Splunk Technology Add-On (TA) for collecting ETW events from Windows systems
☆17Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for TA_ETW
Users that are interested in TA_ETW are comparing it to the libraries listed below
Sorting:
- Splunk app for Threat hunting☆15Nov 15, 2018Updated 7 years ago
- AdHoc solutions☆49Aug 29, 2023Updated 2 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- ☆53Mar 4, 2019Updated 6 years ago
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- ☆33Aug 10, 2019Updated 6 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Oct 14, 2021Updated 4 years ago
- ☆34Feb 26, 2015Updated 11 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Improved auto-away monitoring for Nest Thermostats☆15Oct 12, 2014Updated 11 years ago
- Powershell module to help with all file server tasks without using WMI☆13Feb 15, 2024Updated 2 years ago
- AppNet.link local STUN proxy☆15May 11, 2020Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆10Jan 22, 2025Updated last year
- ☆11Oct 25, 2024Updated last year
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Windows Event Forwarding/Collection - A simple way to get quick, comprehensive logging for a Windows environment.☆16Jun 5, 2022Updated 3 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Ancient two-player strategy race board game☆12Mar 19, 2024Updated last year
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Libgore☆13Apr 14, 2023Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆49Jan 30, 2020Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Sep 4, 2018Updated 7 years ago
- ☆15Sep 24, 2024Updated last year
- A wallet server for Sia☆12Aug 24, 2022Updated 3 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- The GA-IDS is a full-fledged host based intrusion detection system developed using the Java programming language to help detect packets h…☆12Feb 27, 2019Updated 7 years ago
- ☆12Sep 4, 2013Updated 12 years ago