Enumerate active EDR's on the system
☆154Sep 23, 2025Updated 7 months ago
Alternatives and similar repositories for EnumEDRs
Users that are interested in EnumEDRs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 4 months ago
- ☆37Jul 1, 2025Updated 10 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 10 months ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆52Mar 30, 2026Updated last month
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆158Jan 25, 2026Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- Group Policy Objects manipulation and exploitation framework☆304Dec 7, 2025Updated 4 months ago
- ☆50Dec 5, 2025Updated 4 months ago
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Burp plugin for jxscout☆21May 12, 2025Updated 11 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆161Nov 23, 2025Updated 5 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆376Aug 29, 2025Updated 8 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆219Mar 7, 2026Updated last month
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆49Updated this week
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 9 months ago
- Exploitation of CVE-2025-29969☆64Feb 20, 2026Updated 2 months ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 6 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated 2 months ago
- Permanently disable EDRs as local admin☆129Dec 19, 2025Updated 4 months ago
- Arsenal of modules to beacon postex☆102Mar 13, 2026Updated last month
- StoneKeeper C2, an experimental EDR evasion framework for research purposes