DebugPrivilege / OpenProjectLinks
A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding quickly to security incidents.
☆35Updated last year
Alternatives and similar repositories for OpenProject
Users that are interested in OpenProject are comparing it to the libraries listed below
Sorting:
- Baseline a Windows System against LOLBAS☆68Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- a tiny program to consume from ETW providers for research☆52Updated 10 months ago
- A collection of tools, scripts and personal research☆146Updated 3 months ago
- ☆24Updated 8 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆42Updated 7 months ago
- ☆244Updated 5 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 3 months ago
- ☆179Updated 6 months ago
- PowerShell script designed to help Incident Responders collect forensic evidence from local and remote Windows devices.☆108Updated last year
- A collection of CVEs weaponized by ransomware operators☆125Updated 3 weeks ago
- PowerShell PE Parser☆64Updated last year
- My Notes from Hugging Face AI Agents Course☆19Updated 8 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆111Updated 2 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆38Updated 5 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- AppLocker Policy Generator☆24Updated 2 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆133Updated 3 weeks ago
- Ludus range for the Constructing Defense Lab☆40Updated last month
- A C# based tool for analysing malicious OneNote documents☆117Updated 2 years ago
- ☆82Updated 11 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆50Updated last month
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆247Updated last month
- Simulation of Akira Ransomware with Invoke-AtomicTest☆16Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆47Updated 7 months ago
- ☆26Updated 3 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 6 months ago