AbishekPonmudi / PlanqX_EDR-Endpoint-Detection-and-ResponseLinks
PlanqX EDR is an open-source, advanced Endpoint Detection and Response (EDR) solution for Windows, offering real-time system and network security. Features include API hooking, ELAM, ETW integration, AMSI, kernel-mode and APC callbacks, and baseline detection to provide comprehensive threat defense across boot-time and runtime.
☆16Updated 3 months ago
Alternatives and similar repositories for PlanqX_EDR-Endpoint-Detection-and-Response
Users that are interested in PlanqX_EDR-Endpoint-Detection-and-Response are comparing it to the libraries listed below
Sorting:
- Ransomware detection application for Windows using Windows Minifilter driver☆88Updated 5 years ago
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆166Updated 2 years ago
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆307Updated last year
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆154Updated 2 years ago
- Reverse engineering winapi function loadlibrary.☆214Updated 2 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆145Updated 2 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆137Updated 4 years ago
- Controlling Windows PP(L)s☆341Updated 2 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆122Updated 2 years ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆218Updated 4 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆95Updated 2 years ago
- Various Process Injection Techniques☆156Updated 3 years ago
- Collect various versions of ntoskrnl files☆55Updated last year
- It's a kernel-based keylogger for Windows x86/x64.☆141Updated 2 years ago
- Windows 10/11 unsigned kernel driver load/debugging☆14Updated 2 years ago
- capemon: CAPE's monitor☆125Updated this week
- Uses ghidra to find all ETW write metadata for each API in a PE file☆21Updated last year
- Force a file delete using a windows kernel driver☆67Updated 3 years ago
- about how to make a anti-virus engine☆86Updated 3 months ago
- Contents from "nt5src.7z"☆23Updated 3 years ago
- BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology.☆345Updated this week
- Samples for the book Windows Kernel Programming, 2nd edition☆357Updated last month
- PoCs for Kernelmode rootkit techniques research.☆378Updated 2 weeks ago
- A mini filter driver development framework allows you to develop minit filter driver with different features.☆60Updated 4 months ago
- Bypassing PatchGuard on modern x64 systems☆268Updated 2 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆285Updated 4 years ago
- ☆356Updated 2 months ago
- Process Injection using Thread Name☆277Updated 4 months ago
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆261Updated last year
- Detects virtual machines and malware analysis environments☆137Updated 2 years ago