DeepBlueCLI
By sans-blue-team
ATTACK
MITRE ATT&CK Windows Logging Cheat Sheets (by MalwareArchaeology)
DeepBlueCLI | ATTACK | |
---|---|---|
4 | 1 | |
2,085 | 322 | |
1.0% | - | |
6.1 | 10.0 | |
7 months ago | over 5 years ago | |
PowerShell | ||
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DeepBlueCLI
Posts with mentions or reviews of DeepBlueCLI.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-02-08.
-
Is it possible to secure Powershell with MFA?
If you don't have a SIEM/EDR setup for detecting suspicious PowerShell usage, you can also use DeepBlueCLI by Eric Conrad - https://github.com/sans-blue-team/DeepBlueCLI
- Is it possible to analyze old Windows Event Logs to find IOAs or IOCs with Wazuh?
-
What are some of the most frequently used (or favorite) tools in your toolbox?
DeepBlueCLI - Event log parsing for suspicious behavior
-
Getting started on detecting and responding to cybersecurity incidents
If you think that the alert is malicious figure out what has happened. Save hosts security events to a file and run them through DeepBlueCLI(https://github.com/sans-blue-team/DeepBlueCLI). It's a PowerShell tool for detecting threats from Windows logs.
ATTACK
Posts with mentions or reviews of ATTACK.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-02-08.
-
Is it possible to analyze old Windows Event Logs to find IOAs or IOCs with Wazuh?
ATT&CK Cheat Sheets https://github.com/MalwareArchaeology/ATTACK
What are some alternatives?
When comparing DeepBlueCLI and ATTACK you can also consider the following projects:
Loki - Loki - Simple IOC and YARA Scanner
hayabusa - Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
BloodHound - Six Degrees of Domain Admin
SilkETW