A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.
☆25Sep 29, 2024Updated last year
Alternatives and similar repositories for Windows-Sysmon-Threat-Hunting-Guide
Users that are interested in Windows-Sysmon-Threat-Hunting-Guide are comparing it to the libraries listed below
Sorting:
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Personal scripts☆15Sep 11, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- A chrome extension that shows the time but steals the cookies in the back for demonstration purposes.☆23Mar 10, 2025Updated 11 months ago
- BlackArch Linux Keyring☆25Oct 11, 2025Updated 4 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Case, knowledge management and digital investigation platform☆31Feb 26, 2026Updated last week
- List of Sanctions and Most wanted☆29Jun 9, 2017Updated 8 years ago
- Tool to bruteforce Windows LDAP, Kerberos, RDP, SSH, FTP, HTTP basic and digest authentication☆28Dec 31, 2024Updated last year
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- En este repositorio podrás encontrar los ejercicios del canal @aprendePython3 de Telegram así como sus soluciones.☆10May 20, 2020Updated 5 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago
- PowerShell para Administradores☆11Feb 18, 2020Updated 6 years ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- Roadmap for Lantern development☆12Mar 2, 2018Updated 8 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Jan 22, 2026Updated last month
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Dec 9, 2020Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Parse OCR result files for pagenos, tables of contents, etc.☆14Nov 30, 2011Updated 14 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Simplifying the process of launching an open data repository. [RETIRED]☆20Jan 7, 2015Updated 11 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year