DeepBlueCLI - a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC Sample EVTX files are in the .\evtx directory Note If your antivirus freaks out after downloading DeepBlueCLI: it's likely reacting to the included EVTX files in the .\evtx directory (which contain command-line logs of malicious attacks, among other artifacts). EVTX files are not harmful. You may need to configure your antivirus to ignore the DeepBlueCLI directory. Table of Contents Usage Windows Event Logs processed Detected events Examples Output Logging setup See the DeepBlue.py Readme for information on DeepBlue.py See the DeepBlueHash Readme for information on DeepBlueHash (detective safelisting using Sysmon event logs) Usage: .\DeepBlue.ps1 <event log name> <evtx filename> See the Set-ExecutionPolicy Readme if you receive a 'running scripts is disabled on this system' error. Process local Windows security event log (PowerShell must be run as Administrator): .\DeepBlue.ps1 or: .DeepBlue.ps1 -log security Process local Windows system event log: .DeepBlue.ps1 -log system Proc
A comprehensive and unrestricted dataset of security incidents for research and decision-making
Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics.
Check the reputation of an IP address to identify potential threats.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
Facilitating exchange of information and knowledge to collectively protect against cyberattacks.
Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.
A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.