Win10
WELA
Win10 | WELA | |
---|---|---|
1 | 3 | |
167 | 678 | |
- | 4.0% | |
7.2 | 0.0 | |
5 months ago | over 1 year ago | |
PowerShell | PowerShell | |
Mozilla Public License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Win10
-
Finding the last device connected to the PC
I have found interesting stuff about this log on the Internet (1 and 2). Too bad they don't correspond to me.
WELA
What are some alternatives?
Trawler - PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.
hayabusa - Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
WinLoginAudit - Send realtime Windows Login Audit trail to Telegram messenger
teler - Real-time HTTP Intrusion Detection
Queries - SQLite queries
WindowsDFIR - Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or events.
timesketch - Collaborative forensic timeline analysis
PoShLog - :nut_and_bolt: PoShLog is PowerShell cross-platform logging module. It allows you to log structured event data into console, file and much more places easily. It's built upon great C# logging library Serilog - https://serilog.net/
chainsaw - Rapidly Search and Hunt through Windows Forensic Artefacts
SIEM - SIEM Tactics, Techiques, and Procedures
EnableWindowsLogSettings - Documentation and scripts to properly enable Windows event logs.