Evtx to Splunk ingestor
☆16Mar 18, 2022Updated 4 years ago
Alternatives and similar repositories for evtx2splunk
Users that are interested in evtx2splunk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Harness the power of Splunk for your investigations☆160Oct 11, 2025Updated 5 months ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- ☆16Feb 20, 2025Updated last year
- CTF misc usb键盘,鼠标,数位板流量分析脚本,图片宽高修复脚本☆14Jan 19, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Dissect triage scripts for Citrix NetScaler devices☆69Nov 17, 2025Updated 4 months ago
- shiro 1.2.47 反序列化☆20May 28, 2020Updated 5 years ago
- Lightweight throttle layer for alloy providers☆16Mar 10, 2025Updated last year
- sql盲注日志分析工具GUI版本☆16Feb 17, 2024Updated 2 years ago
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 2 weeks ago
- ☆12Mar 24, 2018Updated 8 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- A tool to convert Windows evtx files (Windows Event Log Files) into JSON format and log to Splunk (optional) using HTTP Event Collector.☆58Apr 8, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- 在ShiroAttack2基础上增加 Header 长度绕过、分块、短 Payload等功能☆71Mar 24, 2026Updated 2 weeks ago
- ☆11Oct 14, 2016Updated 9 years ago
- A simple snake game demo with WebGL☆12Jul 2, 2021Updated 4 years ago
- 使用Docker一键制作vol3取证需要的的SymbolTables☆12Aug 31, 2025Updated 7 months ago
- Hack plugins for Kibana☆12Aug 20, 2016Updated 9 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- Extract messages from a local Microsoft Teams installation☆15Jan 14, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/corkami☆14Mar 14, 2015Updated 11 years ago
- A library implementing a generic SQL like query language.☆21Mar 25, 2026Updated 2 weeks ago
- A single server multiple workers distributed architecture that supports HTTP requests on the scheduler and translates them to GRPC reques…☆13Apr 11, 2022Updated 3 years ago
- CobaltStrike流量解密脚本☆40Oct 2, 2023Updated 2 years ago
- 🔍 SQLBlind_Tools 一款从PCAP文件中提取和处理数据的工具,用于快速完成SQL盲注流量分析题目☆16Feb 8, 2024Updated 2 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- only for request cve☆18Apr 16, 2025Updated 11 months ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- ☆16Apr 20, 2023Updated 2 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago