Open EDR public repository
☆2,660Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for openedr
Users that are interested in openedr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source EDR for Windows☆1,302Feb 25, 2023Updated 3 years ago
- ☆2,188Apr 3, 2026Updated last month
- An Active Defense and EDR software to empower Blue Teams☆1,329Mar 31, 2026Updated last month
- ☆1,813Aug 30, 2024Updated last year
- Enumerate and disable common sources of telemetry used by AV/EDR.☆850Mar 11, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,198Jul 5, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- AV/EDR evasion via direct system calls.☆2,013Jan 1, 2023Updated 3 years ago
- Main Sigma Rule Repository☆10,451Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,759Jan 16, 2026Updated 4 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,585Jan 5, 2021Updated 5 years ago
- Windows Events Attack Samples☆2,560Jan 24, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,815Sep 3, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Converts PE into a shellcode☆2,763Aug 30, 2025Updated 8 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,638Jul 31, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,526Nov 15, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,657May 3, 2026Updated 2 weeks ago
- ☆838Jun 1, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆829Aug 23, 2021Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆6,002May 12, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Digging Deeper....☆3,959Updated this week
- Open-Source Shellcode & PE Packer☆2,101Feb 3, 2024Updated 2 years ago
- Adversary Emulation Framework☆11,206May 7, 2026Updated last week
- Utilities for Sysmon☆1,644Apr 4, 2026Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Elastic Security detection content for Endpoint☆1,429May 11, 2026Updated last week
- A repository of sysmon configuration modules☆3,038Aug 21, 2024Updated last year
- The Hunting ELK☆3,922Jun 1, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,744Sep 23, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automated Adversary Emulation Platform☆6,965Updated this week
- YARA signature and IOC database for my scanners and tools☆2,955May 8, 2026Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,176Apr 22, 2026Updated 3 weeks ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,951Updated this week
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,216Jun 17, 2022Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,590Jul 8, 2025Updated 10 months ago