SysmonForLinux
threat-tools
SysmonForLinux | threat-tools | |
---|---|---|
11 | 1 | |
1,620 | 151 | |
2.0% | 0.7% | |
6.6 | 6.5 | |
4 days ago | 7 months ago | |
C | Python | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SysmonForLinux
- Sysmon for Linux
- Any useful cybersecurity software under $5k?
-
Security Cadence: Sysmon (Logging Part 2 out of ?????)
Did you know that Sysmon is so fantastic that Microsoft ported it to Linux? They sure did and it is awesome. It can be found here: https://github.com/Sysinternals/SysmonForLinux
-
Install Sysmon for Linux on RHEL 8?
I followed the install instructions for RHEL 8 found here: https://github.com/Sysinternals/SysmonForLinux/blob/main/INSTALL.md and that seemed to work correctly.
- The GoDaddy hack is wider than initially thought. Started on the 6th of September!
- Microsoft releases Linux version of the Windows Sysmon tool
- Sysmon for Linux 1.0.0 Released
- Microsoft releases Symon for Linux
- Sysinternals/SysmonForLinux
- Sysmon For Linux builds
threat-tools
-
Any useful cybersecurity software under $5k?
Red Team https://github.com/activecm/threat-tools
What are some alternatives?
sysmon-modular - A repository of sysmon configuration modules
Awesome-Red-Teaming - List of Awesome Red Teaming Resources
sysmon-config - Sysmon configuration file template with default high-quality event tracing
CyberPipe - An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.
SysmonTools - Utilities for Sysmon
VanillaWindowsReference - A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update. Use these CSVs to create your own known good hash sets!
Aurora-Incident-Response - Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Malware-IOCs
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.