Open EDR public repository
☆2,631Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for openedr
Users that are interested in openedr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source EDR for Windows☆1,296Feb 25, 2023Updated 3 years ago
- ☆2,175Updated this week
- An Active Defense and EDR software to empower Blue Teams☆1,316Mar 31, 2026Updated last week
- ☆1,798Aug 30, 2024Updated last year
- Enumerate and disable common sources of telemetry used by AV/EDR.☆848Mar 11, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,188Jul 5, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- AV/EDR evasion via direct system calls.☆2,001Jan 1, 2023Updated 3 years ago
- Main Sigma Rule Repository☆10,279Apr 1, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,744Jan 16, 2026Updated 2 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,582Jan 5, 2021Updated 5 years ago
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,807Sep 3, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,610Jul 31, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,513Nov 15, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,597Apr 1, 2026Updated last week
- ☆829Jun 1, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆825Aug 23, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,927Apr 1, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Digging Deeper....☆3,869Updated this week
- Adversary Emulation Framework☆10,958Apr 2, 2026Updated last week
- Open-Source Shellcode & PE Packer☆2,084Feb 3, 2024Updated 2 years ago
- Utilities for Sysmon☆1,634Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- Elastic Security detection content for Endpoint☆1,394Updated this week
- A repository of sysmon configuration modules☆3,007Aug 21, 2024Updated last year
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated Adversary Emulation Platform☆6,868Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,147Oct 19, 2025Updated 5 months ago
- YARA signature and IOC database for my scanners and tools☆2,904Apr 1, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,524Jul 8, 2025Updated 9 months ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Dump the memory of a PPL with a userland exploit☆889Jul 24, 2022Updated 3 years ago