All Projects → ETWNetMonv3 → Similar Projects or Alternatives

604 Open source projects that are alternatives of or similar to ETWNetMonv3

ETWProcessMon2
ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 55 (+71.88%)
Mutual labels:  detection, etw, blueteam
Macos Attack Dataset
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
Stars: ✭ 116 (+262.5%)
Mutual labels:  detection, threat-hunting, blueteam
VindicateTool
LLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (+25%)
Mutual labels:  detection, blue-team
Threathunt
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (+187.5%)
Mutual labels:  threat-hunting, blueteam
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+2012.5%)
Mutual labels:  detection, threat-hunting
Awesome Threat Detection
A curated list of awesome threat detection and hunting resources
Stars: ✭ 1,804 (+5537.5%)
Mutual labels:  detection, threat-hunting
EVTX-ETW-Resources
Event Tracing For Windows (ETW) Resources
Stars: ✭ 142 (+343.75%)
Mutual labels:  detection, etw
BLUELAY
Searches online paste sites for certain search terms which can indicate a possible data breach.
Stars: ✭ 24 (-25%)
Mutual labels:  threat-hunting, blueteam
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+600%)
Mutual labels:  detection, threat-hunting
Pcap Attack
PCAP Samples for Different Post Exploitation Techniques
Stars: ✭ 175 (+446.88%)
Mutual labels:  detection, threat-hunting
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+87.5%)
Mutual labels:  blueteam, blue-team
Cryptography
Some simple cryptographic examples on C# 6.0
Stars: ✭ 14 (-56.25%)
Mutual labels:  csharp-code
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+2709.38%)
Mutual labels:  blueteam
dummyDLL
Utility for hunting UAC bypasses or COM/DLL hijacks that alerts on the exported function that was consumed.
Stars: ✭ 35 (+9.38%)
Mutual labels:  blueteam
bank mitigations
Anti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo
Stars: ✭ 17 (-46.87%)
Mutual labels:  blueteam
object detection
Implementatoin of object detection using Tensorflow 2.1.0 | this can be use in a car for object detection
Stars: ✭ 13 (-59.37%)
Mutual labels:  detection
AnticheatJS
Javascript Anti Cheats 101
Stars: ✭ 81 (+153.13%)
Mutual labels:  detection
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+568.75%)
Mutual labels:  threat-hunting
LD
Localization Distillation for Dense Object Detection (CVPR 2022)
Stars: ✭ 271 (+746.88%)
Mutual labels:  detection
R-CNN LIGHT
Regional-Convolution Neural Network for blink detection based on contouring.
Stars: ✭ 66 (+106.25%)
Mutual labels:  detection
ps-srum-hunting
PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting
Stars: ✭ 16 (-50%)
Mutual labels:  threat-hunting
QuakeMigrate
A Python package for automatic earthquake detection and location using waveform migration and stacking.
Stars: ✭ 101 (+215.63%)
Mutual labels:  detection
brfv4 android examples
Android Studio project (Java)
Stars: ✭ 43 (+34.38%)
Mutual labels:  detection
device.js
🧬 Reactive library to observe essential browser and device properties.
Stars: ✭ 29 (-9.37%)
Mutual labels:  detection
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+146.88%)
Mutual labels:  blueteam
GitRewrite
Rewrite git history. Faster alternative to git filter-branch or bfg-repo-cleaner to perform certain rewrite tasks on a git repository.
Stars: ✭ 78 (+143.75%)
Mutual labels:  csharp-code
nnDetection
nnDetection is a self-configuring framework for 3D (volumetric) medical object detection which can be applied to new data sets without manual intervention. It includes guides for 12 data sets that were used to develop and evaluate the performance of the proposed method.
Stars: ✭ 355 (+1009.38%)
Mutual labels:  detection
win-beacon
Managed BT stack for Windows able to detect and act as an iBeacon.
Stars: ✭ 49 (+53.13%)
Mutual labels:  detection
TeeChart-for-.NET-CSharp-WPF-samples
Assorted WPF examples
Stars: ✭ 18 (-43.75%)
Mutual labels:  csharp-code
yara-parser
Tools for parsing rulesets using the exact grammar as YARA. Written in Go.
Stars: ✭ 69 (+115.63%)
Mutual labels:  detection
gradle-cpd-plugin
Gradle plugin to find duplicate code using PMDs copy/paste detection (= CPD).
Stars: ✭ 88 (+175%)
Mutual labels:  detection
powerai-vision-object-detection
Use deep learning to create a model and a REST endpoint to allow your app to detect, locate and count your product on store shelves
Stars: ✭ 93 (+190.63%)
Mutual labels:  detection
BCNet
Deep Occlusion-Aware Instance Segmentation with Overlapping BiLayers [CVPR 2021]
Stars: ✭ 434 (+1256.25%)
Mutual labels:  detection
Perception-of-Autonomous-mobile-robot
Perception of Autonomous mobile robot,Using ROS,rs-lidar-16,By SLAM,Object Detection with Yolov5 Based DNN
Stars: ✭ 40 (+25%)
Mutual labels:  detection
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+2737.5%)
Mutual labels:  detection
SIGMA-detection-rules
Set of SIGMA rules (>250) mapped to MITRE Att@k tactic and techniques
Stars: ✭ 97 (+203.13%)
Mutual labels:  threat-hunting
Abnormal-behavior-Detection
Abnormal behavior detection in the video surveillance based on yolo darknet
Stars: ✭ 35 (+9.38%)
Mutual labels:  detection
PowerGRR
PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.
Stars: ✭ 52 (+62.5%)
Mutual labels:  threat-hunting
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-28.12%)
Mutual labels:  threat-hunting
Secure-Coding-Handbook
Web Application Secure Coding Handbook resource.
Stars: ✭ 328 (+925%)
Mutual labels:  blueteam
Shadowless
A Fast and Open Source Autonomous Perception System.
Stars: ✭ 29 (-9.37%)
Mutual labels:  detection
crowd density segmentation
The code for preparing the training data for crowd counting / segmentation algorithm.
Stars: ✭ 21 (-34.37%)
Mutual labels:  detection
csharp
📚 Recursos para aprender C#
Stars: ✭ 37 (+15.63%)
Mutual labels:  csharp-code
Triton
🐳 Scripps Whale Acoustics Lab 🌎 Scripps Acoustic Ecology Lab - Triton with remoras in development
Stars: ✭ 25 (-21.87%)
Mutual labels:  detection
yolov5 obb
yolov5 + csl_label.(Oriented Object Detection)(Rotation Detection)(Rotated BBox)基于yolov5的旋转目标检测
Stars: ✭ 1,105 (+3353.13%)
Mutual labels:  detection
csirtg-smrt-v1
the fastest way to consume threat intelligence.
Stars: ✭ 27 (-15.62%)
Mutual labels:  threat-hunting
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-3.12%)
Mutual labels:  threat-hunting
emot
Open source Emoticons and Emoji detection library: emot
Stars: ✭ 178 (+456.25%)
Mutual labels:  detection
thremulation-station
Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Stars: ✭ 28 (-12.5%)
Mutual labels:  threat-hunting
hand detector.d2
Hand detection models trained on 100DOH (100 Days of Hands) dataset.
Stars: ✭ 60 (+87.5%)
Mutual labels:  detection
Hand-Digits-Recognition
Recognize your own handwritten digits with Tensorflow, embedded in a PyQT5 GUI. The Neural Network was trained on MNIST.
Stars: ✭ 11 (-65.62%)
Mutual labels:  detection
TA ETW
Splunk Technology Add-On (TA) for collecting ETW events from Windows systems
Stars: ✭ 17 (-46.87%)
Mutual labels:  etw
SysmonConfigPusher
Pushes Sysmon Configs
Stars: ✭ 59 (+84.38%)
Mutual labels:  threat-hunting
timeline
Timeline - A photo organizer
Stars: ✭ 39 (+21.88%)
Mutual labels:  detection
Portforge
Lightweight utility to fool port scanners
Stars: ✭ 23 (-28.12%)
Mutual labels:  blue-team
Responsive
ASP.NET Core Responsive middleware for routing base upon request client device detection to specific view
Stars: ✭ 36 (+12.5%)
Mutual labels:  detection
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2012.5%)
Mutual labels:  detection
ELK-Hunting
Threat Hunting with ELK Workshop (InfoSecWorld 2017)
Stars: ✭ 58 (+81.25%)
Mutual labels:  threat-hunting
tools-generation-detection-synthetic-content
Compilation of the state of the art of tools, articles, forums and links of interest to generate and detect any type of synthetic content using deep learning.
Stars: ✭ 107 (+234.38%)
Mutual labels:  detection
tensorflow object detection helper tool
tensorflow object detection api helper tool ( custom object detection )
Stars: ✭ 30 (-6.25%)
Mutual labels:  detection
1-60 of 604 similar projects