netsec-goggle
evtx-hunter
netsec-goggle | evtx-hunter | |
---|---|---|
2 | 2 | |
66 | 137 | |
- | 0.0% | |
1.5 | 0.0 | |
about 1 year ago | over 2 years ago | |
Shell | Python | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
netsec-goggle
evtx-hunter
What are some alternatives?
zombie-system-demo - A simple setup that demonstrates concept of zombie computer and using it for dos.
beagle - Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Cameradar - Cameradar hacks its way into RTSP videosurveillance cameras
EVTX-to-MITRE-Attack - Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.
SRX-security-zone-sessions - This Ansible example will show how to retrieve the security session count by zone.
APT-Hunter - APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
IntelOwl - IntelOwl: manage your Threat Intelligence at scale
Watcher - Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Microsoft-eventlog-mindmap - Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...
python-evtx - Pure Python parser for Windows Event Log files (.evtx)
intelmq - IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.