SysmonFind is a Sysmon event search engine, both local and remote, that allows you to analyze or investigate security incidents in real time. Sysmon must be installed on the computer.
https://github.com/mikeHack23/SYSMON_INSTALL
Application to read sysmon logs, either local or from remote computers, this application searches whatever, based on free searches or Regex searches, what can you do?
- Analyze which process started the communication to a certain IP,
- Search for some IOCs
- Malware analysis
- Search for event IDs and parser the content
- Forensics
- Use of ByPass to use credentials and consult computers in Domain or not
Examples:
\b(?:\d{1,3}\.){3}\d{1,3}\b\b(?:[A-Fa-f0-9]{1,4}:){7}[A-Fa-f0-9]{1,4}\b\b\d{2}-\d{6}-\d{4}-[A-Z]{2}\b[0-9][0-9][0-9][0-9]?\.exeFiles generated with sequence: chymbacjDriverUpgradeMastersynlDriverBoost.exe, chymmtwmDriverOptimizerExpertfuqpDriverDiagnostics.exe
.*Driver.*Driver.*\.exe.*The program encrypts the password, so that no other application has access to the passwords used.
- https://github.com/mikeHack23/SYSMON_INSTALL
- https://download.visualstudio.microsoft.com/download/pr/06239090-ba0c-46e2-ad3e-6491b877f481/c5e4ab5e344eb3bdc3630e7b5bc29cd7/windowsdesktop-runtime-6.0.21-win-x64.exe
- folder "SysmonFind_Log" file .log
- folder "\AppData\Local\SysmonFind" file .log




