WELA
Win10
WELA | Win10 | |
---|---|---|
3 | 1 | |
678 | 167 | |
0.0% | - | |
0.0 | 7.2 | |
over 1 year ago | 6 months ago | |
PowerShell | PowerShell | |
GNU General Public License v3.0 only | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
WELA
Win10
-
Finding the last device connected to the PC
I have found interesting stuff about this log on the Internet (1 and 2). Too bad they don't correspond to me.
What are some alternatives?
hayabusa - Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Trawler - PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.
teler - Real-time HTTP Intrusion Detection
WinLoginAudit - Send realtime Windows Login Audit trail to Telegram messenger
WindowsDFIR - Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or events.
Queries - SQLite queries
timesketch - Collaborative forensic timeline analysis
PoShLog - :nut_and_bolt: PoShLog is PowerShell cross-platform logging module. It allows you to log structured event data into console, file and much more places easily. It's built upon great C# logging library Serilog - https://serilog.net/
chainsaw - Rapidly Search and Hunt through Windows Forensic Artefacts
SIEM - SIEM Tactics, Techiques, and Procedures
EnableWindowsLogSettings - Documentation and scripts to properly enable Windows event logs.