In order to build this project, we rely on our docs infrastructure. To build the HTML of the complete project, run the following commands: # clone this repo git clone ...
After Collecting event logs and kerberos traffic on all domain controllers, WatchAD can detect a variety of known or unknown threats through features matching, Kerberos protocol analysis, historical ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results