Open source Windows Event Collector
-
Updated
Jun 15, 2024 - Python
Open source Windows Event Collector
Qt based application to decode windows log files(.etl and .evtx) to txt files
AI destekli çoklu platform log analiz ve güvenlik aracı - Windows, Linux, macOS için otomatik log toplama ve güvenlik analizi
The Granted Access Converter is a utility designed to help users understand and interpret the GrantedAccess values found in Sysmon Event ID 10 logs.
Windows disk cleanup PowerShell script.
PowerShell script to efficiently search and analyze Windows Event Logs.
A CLI program that fetches logs from Windows Event Viewer. Summarizes them via OpenAI GPT and exports in various file types
A practical cybersecurity project focused on building and configuring a SIEM environment using Splunk/ELK Stack to collect, monitor, and analyze Windows event and Sysmon logs. Includes real-world attack simulations, threat detection dashboards, and an incident response report.
Windows Security Monitoring Dashboard in Splunk – detect failed logons, track account lockouts, and visualize authentication trends.
Custom CrowdSec parser test to detect Windows brute-force login attempts (Issue #1235)
Add a description, image, and links to the windows-logs topic page so that developers can more easily learn about it.
To associate your repository with the windows-logs topic, visit your repo's landing page and select "manage topics."