A lightweight, cross-platform toolkit to monitor critical system events on both Windows and Linux environments.
🛡️ Built from scratch, written manually — designed for sysadmins, pentesters, and students who want to truly understand system logging without relying on external tools.
- Windows tool using PowerShell
- CLI interface
- Based on
Get-WinEvent
- Supports Event ID search and optional filters (e.g. user, handle, object)
- Outputs to
C:\log_audit.txt
- Linux script for manual auditing
- Checks root activity, logins, cron, sudo logs, and more
- Outputs to
/root/audit_log.log
- ✅ Security event monitoring on Windows (Logon, Account Locked, etc.)
- ✅ Optional user/object filter
- ✅ Clean persistent logging
- ✅ Readable, modifiable Linux script
- ✅ No external dependencies
- Junior sysadmins who want hands-on practice
- Red teamers or pentesters needing low-level visibility
- Students who want to understand system logs
- PowerShell 5+
- Admin privileges to read Security logs
- Bash
- Root privileges to access system logs
git clone https://github.com/matteosalis04/Auditing-ToolKit.git
cd Auditing-ToolKit/Windows
powershell -ExecutionPolicy Bypass -File auditing.ps1
git clone https://github.com/matteosalis04/Auditing-ToolKit.git
cd Auditing-ToolKit/Linux
sudo bash auditing.sh
Made by @MS-0x404
MIT — do what you want, just give credit.