LogonTracer is a tool designed to investigate malicious logons by visualizing and analyzing Windows Active Directory event logs. It associates host names or IP addresses with account names found in logon-related events, displaying them as a graph to identify the account where login attempts occur and the host used. LogonTracer can visualize event IDs related to Windows logon, such as 4624 for successful logon, 4625 for logon failure, 4768 for Kerberos Authentication (TGT Request), 4769 for Kerberos Service Ticket (ST Request), 4776 for NTLM Authentication, and 4672 for assigning special privileges. The tool utilizes PageRank, Hidden Markov model, and ChangeFinder for detecting malicious hosts and accounts from event logs, and can display event logs chronologically. LogonTracer can be used by installing it via docker and referring to its documentation for further details.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A dynamic GUI for advanced log analysis, allowing users to execute SQL queries on structured log data.
A tool that collects and displays user activity and system events on a Windows system.
Windows Event Log Analyzer with logon timeline generator and noise reduction for fast forensics.
HonnyPotter is a WordPress plugin that logs all failed login attempts, with a caution to use it at your own risk.
Elastic is a search-powered AI company that enables users to find answers from all data in real-time at scale.
Procmon for Linux is a reimagining of the classic Procmon tool from Windows, allowing Linux developers to trace syscall activity efficiently.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.