Open EDR public repository
☆2,617Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for openedr
Users that are interested in openedr are comparing it to the libraries listed below
Sorting:
- Open Source EDR for Windows☆1,297Feb 25, 2023Updated 3 years ago
- ☆2,173Feb 21, 2023Updated 3 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,315Aug 10, 2023Updated 2 years ago
- ☆1,793Aug 30, 2024Updated last year
- Enumerate and disable common sources of telemetry used by AV/EDR.☆843Mar 11, 2021Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,188Jul 5, 2023Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,878Aug 18, 2023Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,999Jan 1, 2023Updated 3 years ago
- Main Sigma Rule Repository☆10,203Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,688Mar 13, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,735Jan 16, 2026Updated 2 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- AV/EDR evasion via direct system calls.☆1,797Sep 3, 2022Updated 3 years ago
- Converts PE into a shellcode☆2,752Aug 30, 2025Updated 6 months ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,162Mar 31, 2021Updated 4 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,576Oct 31, 2025Updated 4 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,601Jul 31, 2024Updated last year
- ☆826Jun 1, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated last month
- Digging Deeper....☆3,809Mar 13, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,890Updated this week
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Adversary Emulation Framework☆10,838Updated this week
- Open-Source Shellcode & PE Packer☆2,074Feb 3, 2024Updated 2 years ago
- Utilities for Sysmon☆1,576Sep 21, 2025Updated 5 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,828Nov 3, 2024Updated last year
- A repository of sysmon configuration modules☆2,994Aug 21, 2024Updated last year
- The Hunting ELK☆3,912Jun 1, 2024Updated last year
- Elastic Security detection content for Endpoint☆1,384Mar 13, 2026Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 5 months ago
- Automated Adversary Emulation Platform☆6,811Mar 9, 2026Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,137Oct 19, 2025Updated 5 months ago
- YARA signature and IOC database for my scanners and tools☆2,882Mar 9, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,931Jan 20, 2026Updated last month
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,491Jul 8, 2025Updated 8 months ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- Dump the memory of a PPL with a userland exploit☆888Jul 24, 2022Updated 3 years ago