There are 19 repositories under sysmon topic.
Sysmon configuration file template with default high-quality event tracing
Block spying and tracking on Windows
Automate the creation of a lab environment complete with security tooling and logging best practices
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
A repository of sysmon configuration modules
Utilities for Sysmon
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs
Documentation and scripts to properly enable Windows event logs.
Investigate suspicious activity by visualizing Sysmon's event log
The world's most powerful System Activity Monitor Engine · 一款功能强大的终端行为采集防御开发套件 ~ 旨在帮助EDR、零信任、数据安全、审计管控等终端安全软件可以快速实现产品功能, 而不用关心底层驱动的开发、维护和兼容性问题,让其可以专注于业务开发
Endpoint detection & Malware analysis software
Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technical Guidance for Windows Event Logging.
ThreatSeeker: Threat Hunting via Windows Event Logs
Consolidation of various resources related to Microsoft Sysmon & sample data/log
Hands-on cybersecurity training projects for beginners, focusing on vulnerability management, incident response, and log analysis
A Ruleset to enhance detection capabilities of Ossec using Sysmon
RDLL for Cobalt Strike beacon to silence sysmon process
Sysmon and wazuh integration with Sigma sysmon rules [updated]
SysEye是一个window上的基于att&ck现代EDR设计**的威胁响应工具.有效检测常见的未知威胁与已知威胁.防守方的利剑
This repository contains Splunk queries to hunt some anomalies
This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malware analysis. This can be used in production, however you might want to tune the GPO edits as needed.
Universal Winlogbeat configuration
Deploy and maintain Symon through the Splunk Deployment Sever
Command line & PPID spoofing