This repository summarizes the results of examining logs recorded in Windows upon execution of the 49 tools which are likely to be used by the attacker that has infiltrated a network.
Tool Analysis Result Sheet is created in HTML and can be checked from the following URL.
https://jpcertcc.github.io/ToolAnalysisResultSheet/
A report that outlines and usage of this research is published below. When using Tool Analysis Result Sheet, we recommend you to check the report.
Detecting Lateral Movement through Tracking Event Logs (Version 2)