A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.
☆26Sep 29, 2024Updated last year
Alternatives and similar repositories for Windows-Sysmon-Threat-Hunting-Guide
Users that are interested in Windows-Sysmon-Threat-Hunting-Guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Patched Bash 3.2.24 to log all actions to syslog☆13Dec 16, 2017Updated 8 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- ☆34Mar 4, 2019Updated 7 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- A python 3 script for extracting messages from Viber Desktop's sqlite message database into a text file.☆11Dec 24, 2019Updated 6 years ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- POC☆43Jul 21, 2025Updated 8 months ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- Bring runZero Exposure Management into BloodHound☆46Mar 14, 2026Updated last week
- Tool to bruteforce Windows LDAP, Kerberos, RDP, SSH, FTP, HTTP basic and digest authentication☆28Dec 31, 2024Updated last year
- Detection for CVE-2025-61675, CVE-2025-61678 & CVE-2025-66039☆47Dec 15, 2025Updated 3 months ago
- ☆23Mar 4, 2025Updated last year
- A small stuff of telegram bot for pentest and information gathering.☆11Oct 3, 2020Updated 5 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- ☆12Feb 20, 2022Updated 4 years ago
- Open-source LLM Prompt-Injection and Jailbreaking Playground☆31Jul 19, 2025Updated 8 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- List of Sanctions and Most wanted☆29Jun 9, 2017Updated 8 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Python library powering opsi☆20Mar 6, 2026Updated 2 weeks ago
- ☆21Feb 24, 2026Updated last month
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 4 months ago
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆342Feb 2, 2026Updated last month