sysmon-config
System monitor
A configuration package for advanced system monitoring using Sysmon, designed to detect and alert on various threat activities and provide forensic visibility.
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
778 stars
89 watching
142 forks
Language: PowerShell
last commit: about 1 year ago dfirdigitalforensicsforensic-analysisforensicartifactsforensicsgrayloggraylog-pluginhumiologgingmitre-attacknetsecsiemsigma-rulessysinternalssysmonthreat-analysisthreat-huntingthreat-intelligencethreat-sharingthreatintel
Related projects:
Repository | Description | Stars |
---|---|---|
ion-storm/sysmon-edr | A PowerShell-based EDR system with Sysmon integration to detect and respond to security threats. | 218 |
swiftonsecurity/sysmon-config | A template configuration file for Microsoft Sysinternals' Sysmon to monitor system changes with high-quality event tracing. | 4,818 |
gridhead/sysmon | A remotely-accessible system performance monitoring and task management tool for servers and Raspberry Pi setups | 191 |
olafhartong/sysmon-modular | A repository of customizable Sysmon configuration modules for security analysis and threat hunting. | 2,669 |
mhaggis/sysmon-dfir | A curated collection of resources and tools for learning and implementing Microsoft Sysmon for incident detection, threat hunting, and endpoint security monitoring. | 900 |
lt0/sysmon | A system monitor that provides real-time usage data of Linux systems via a web browser or mobile clients. | 117 |
nshalabi/sysmontools | Utilities for analyzing and visualizing Windows event logs from Sysmon, helping users track and monitor system activity. | 1,489 |
krispycamel4u/sysmontask | A Linux system monitoring tool with task management features similar to Windows Task Manager. | 689 |
jpcertcc/sysmonsearch | Analyzes Sysmon event logs to detect suspicious activity and visualize process and network correlations. | 417 |
neo23x0/sysmon-config | A comprehensive Sysmon configuration file template with default high-quality event tracing | 454 |
fossfreedom/indicator-sysmonitor | An application indicator for monitoring system parameters such as CPU temperature, memory usage, network speed and public IP address. | 732 |
dcso/fever | A fast and extensible system for processing JSON events from security monitoring tools | 50 |
scarredmonk/sysmonsimulator | A utility to simulate Windows event logs for testing EDR detections and correlation rules | 833 |