Tool that gathers a customizable set of ETW telemetry and generates user-defined detections
☆47Jan 28, 2026Updated last month
Alternatives and similar repositories for EventHorizon
Users that are interested in EventHorizon are comparing it to the libraries listed below
Sorting:
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆58Feb 26, 2026Updated 3 weeks ago
- WMI Explorer☆89Jan 5, 2026Updated 2 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆13May 27, 2025Updated 9 months ago
- Windows Event Log Knowledge Base☆31Dec 23, 2025Updated 2 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- AWS Attack Path Scanner - Discover privilege escalation paths across 10+ AWS services☆144Dec 4, 2025Updated 3 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆69Mar 8, 2026Updated last week
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- ☆24Feb 21, 2025Updated last year
- PHP 8 Sandbox Escape☆68Feb 28, 2026Updated 3 weeks ago
- Sysmon Config Pusher - Modernized☆34Jan 7, 2026Updated 2 months ago
- Offensive security toolkit for Claude Code☆70Updated this week
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated 2 months ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆128Feb 17, 2026Updated last month
- ☆19Jul 14, 2025Updated 8 months ago
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- ☆20Mar 6, 2026Updated 2 weeks ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- ☆19Jan 8, 2026Updated 2 months ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- ☆47Jan 8, 2026Updated 2 months ago
- ☆15Sep 24, 2024Updated last year
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- ☆21Sep 12, 2025Updated 6 months ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆24Dec 28, 2025Updated 2 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆122Updated this week
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆241Oct 30, 2025Updated 4 months ago