ThreatHunting VS sysmon-config

Compare ThreatHunting vs sysmon-config and see what are their differences.


Tools for hunting for threats. (by GossiTheDog)


Sysmon configuration file template with default high-quality event tracing (by SwiftOnSecurity)
Our great sponsors
  • Scout APM - Less time debugging, more time building
  • SonarLint - Clean code begins in your IDE with SonarLint
  • SaaSHub - Software Alternatives and Reviews
ThreatHunting sysmon-config
1 23
366 3,605
- -
3.1 1.6
29 days ago 5 months ago
GNU General Public License v3.0 only -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.


Posts with mentions or reviews of ThreatHunting. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-07-26.


Posts with mentions or reviews of sysmon-config. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-05-16.
  • Installing Sysmon Using PowerShell Invoke-Command
    1 project | | 25 Jun 2022
    Also, might also want to check out for some examples and options.
  • Security Cadence: Sysmon (Logging Part 2 out of ?????)
    4 projects | | 16 May 2022
    There are also some excellent sample configuration files out there, and -in my opinion- the best of them is from Swift on Security:
  • Integrating Sysmon events with Crowdsec
    2 projects | | 16 May 2022
    Thank you for those wonderful news, i will be glad to collaborate and test it for the community, in fact i am already in Crowdsec Discord channel ,but it will take little bit more time for me to be familiar with Crowdsec integration (around 2 weeks) ,have some tasks in queue ,any way ,if its help we are using this set of rules sysmon rules , to prioritize our detection , in addition we using also Soar Suffle to automate some hash checking for certain folders and files against MISP and Malwarebazar workflows
  • splunk sysmon events
    2 projects | | 2 Apr 2022
    Yes absolutely. This is a very common workflow for both. One note is that you need to also find a sysmon config to use as well, and there's no easy way to manage either sysmon or its config through Splunk. Recommendations for a config are either SwiftOnSecurity's or Olaf's SysmonModular. They significantly overlap and work with each other on patches. SwiftOnSecurity's is a better pure drop-in, and Olaf's is better if you want to do customization.
  • Sysmon DNS Queries Issues
    1 project | | 28 Mar 2022
    Does anyone here use Sysmon, and have you used this SwiftOnSecurity config before? I am attempting to use it for the first time to track down processes triggering suspicious DNS queries, but it is not generating any Event 22s in Event Viewer, though it should be.
  • What's your approach to gathering data for DFIR analysis, and how much data do you typically gather?
    2 projects | | 26 Mar 2022
  • List Windows Event Id to monitor
    1 project | | 24 Mar 2022
    Config for sysmon to make sure important events are actually making it into the logs:
  • Windows sysmon: nice tool to assist with DNS monitoring
    1 project | | 22 Mar 2022
    The Microsoft Windows Sysinternals sysmon tool can identify and log which Windows process kicks out a DNS query. Sysmon generates a lot of logs by default though, so Swift on Security (our friend from Twitter and has a really nice sysmon config that filters out a bunch of the noise: This filtering will make it easier to spot the shenanigans.
  • Infected PC sends thousands of DNS requests, what are the options?
    1 project | | 26 Feb 2022
    If it's generating a lot of DNS requests, maybe download Sysmon from: Put sysmon.exe in C:\tools\ and ran from an admin prompt: sysmon.exe -c .\sysmon-dns.xml Where sysmon-dns.xml is a file I created based on but just targeting the DNS section. So it's down to the following:
  • The Mysterious SDD Failures
    1 project | | 25 Feb 2022
    You could throw Sysmon on the device with a basic config such as - you probably then need to increase the size of the Event log to support this.

What are some alternatives?

When comparing ThreatHunting and sysmon-config you can also consider the following projects:

sigma - Generic Signature Format for SIEM Systems

SysmonTools - Utilities for Sysmon

ansible-role-elasticsearch - Ansible Role - Elasticsearch

signature-base - Signature base for my scanner tools

sysmon-modular - A repository of sysmon configuration modules

MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform

vscode-sysmon - Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.

Event-Forwarding-Guidance - Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber

PetitPotam - PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.


SysmonConfigPusher - Pushes Sysmon Configs

EventFinder2 - Finds event logs between two time points. Useful for helpdesk/support/malware analysis.