DebugPrivilege / OpenProjectLinks
A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding quickly to security incidents.
☆34Updated 9 months ago
Alternatives and similar repositories for OpenProject
Users that are interested in OpenProject are comparing it to the libraries listed below
Sorting:
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- ☆24Updated 6 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- a tiny program to consume from ETW providers for research☆51Updated 7 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆42Updated 5 months ago
- ☆238Updated 2 months ago
- ☆68Updated 7 months ago
- A collection of tools, scripts and personal research☆146Updated 3 weeks ago
- AppLocker Policy Generator☆19Updated last week
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.☆205Updated 3 weeks ago
- Persist like a Dodder☆64Updated 3 months ago
- ☆173Updated 4 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆37Updated 6 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆86Updated 3 weeks ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆33Updated 3 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 7 months ago
- PowerShell PE Parser☆63Updated last year
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆34Updated 2 months ago
- ☆159Updated 7 months ago
- ☆108Updated 10 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆48Updated last year
- ☆152Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 5 months ago
- ☆104Updated 9 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆37Updated 3 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last week