Skip to content
#

windows-event-logs

Here are 19 public repositories matching this topic...

*This simulation captures core, widely observed attacker behaviors aligned with common enterprise intrusion patterns. From brute-force access to obfuscated execution, persistence, recon, and privilege assessment, each step reflects actions that threat actors commonly execute after compromising a host.

  • Updated Jul 4, 2025
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the windows-event-logs topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the windows-event-logs topic, visit your repo's landing page and select "manage topics."

Learn more