CrowdStrike / falcon-windows-host-recoveryView external linksLinks
Automated Windows host recovery
☆37Oct 7, 2024Updated last year
Alternatives and similar repositories for falcon-windows-host-recovery
Users that are interested in falcon-windows-host-recovery are comparing it to the libraries listed below
Sorting:
- Genome-wide TR catalog and variation clusters described in [Weisburd, Dolzhenko, et al. 2024]☆17Jan 30, 2026Updated 2 weeks ago
- Phasing of dikaryotic fungal genome assemblies☆13Mar 1, 2023Updated 2 years ago
- Protein Purification☆11Dec 7, 2016Updated 9 years ago
- Grabbing genome accessions & download info based on taxonomy, using the NCBI REST API, w00t☆12Feb 23, 2025Updated 11 months ago
- Python module to manipulate and visualize minimap2's cs tag☆11Jul 28, 2024Updated last year
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Tumor type classifier using cancer genomic panel sequencing data☆12Mar 12, 2024Updated last year
- PanEffect is a JavaScript framework to explore variant effects across a pangenome. The tool has two views that allows a user to (1) expl…☆13Jan 30, 2024Updated 2 years ago
- PSI-MOD ontology for modified and unmodified amino acid residues☆14Jan 8, 2026Updated last month
- CLfinder-OrthNet, a pipeline to encode orthologs from multiple genomes and their evolutionary history into networks (OrthNets) based on c…☆10Jun 9, 2022Updated 3 years ago
- ☆16Jan 14, 2026Updated last month
- This is a tool to estimate pairwise relatedness from ancient DNA, taking in account contamination, ROH, ascertainment bias.☆14Aug 6, 2024Updated last year
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 9 months ago
- ☆13Nov 15, 2017Updated 8 years ago
- A Rust-based library for phylogenetic analysis and manipulation☆16Updated this week
- scripts used to analyse horizontal transfer and evolution of transposable elements in 307 vertebrate species☆11May 16, 2021Updated 4 years ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Azure Resource Graph example queries to build upon☆12Sep 20, 2019Updated 6 years ago
- ☆10Jun 26, 2024Updated last year
- Interactive package for Short AsyNchronous Time-series Analysis (SANTA) in R, implemented in Shiny☆11Mar 6, 2024Updated last year
- A package to count reads mapping on transposable elements subfamilies, families and classes.☆12Feb 3, 2023Updated 3 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆13Jul 26, 2025Updated 6 months ago
- Genotyping lots of samples with big pangenomes☆11Oct 30, 2025Updated 3 months ago
- R Bindings for htslib/bcf☆10Oct 4, 2023Updated 2 years ago
- A haplotype-resolved and telomere-to-telomere genome assembly pipeline (PHap) tailored for autopolyploids, relying solely on common seque…☆16Jul 29, 2025Updated 6 months ago
- ☆13Jul 9, 2024Updated last year
- ☆10Jan 18, 2023Updated 3 years ago
- R functions for very fast eigenvector calculation☆11Jan 18, 2023Updated 3 years ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 3 months ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- R integration for edlib, a C/C++ library for pairwise sequence alignment using edit distance (Levenshtein distance).☆11Jul 20, 2025Updated 6 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 7 months ago
- How to really install tensorflow-gpu from source on a clean instance of Ubuntu☆11Sep 29, 2023Updated 2 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆22Jan 30, 2026Updated 2 weeks ago