whikernel / evtx2splunkLinks
Evtx to Splunk ingestor
☆15Updated 3 years ago
Alternatives and similar repositories for evtx2splunk
Users that are interested in evtx2splunk are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Beacon configuration extractor and parser.☆157Updated last month
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆302Updated 2 years ago
- Parses amcache.hve files, but with a twist!☆146Updated 11 months ago
- Windows symbol tables for Volatility 3☆91Updated last year
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆181Updated 5 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆272Updated 4 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆129Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- Live forensic artifacts collector☆172Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆156Updated 7 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated last month
- Active C2 IoCs☆99Updated 3 years ago
- Linux Evidence Acquisition Framework☆117Updated last year
- A small util to brute-force prefetch hashes☆77Updated 3 years ago
- Incident Response - Fast suspicious file finder☆247Updated last week
- Initial triage of Windows Event logs☆104Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆134Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 4 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆338Updated 2 years ago
- Volatility, on Docker 🐳☆40Updated last month
- ☆554Updated 2 years ago
- Beta versions of my software☆268Updated 6 months ago
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆180Updated 10 months ago
- RegRipper4.0☆74Updated last week
- Queries for Carbon Black Response☆11Updated 5 years ago
- Active C&C Detector☆156Updated 2 years ago
- ☆160Updated 2 years ago
- My conference presentations☆87Updated last month
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Updated 2 years ago