A list of RMMs designed to be used in automation to build alerts
☆117Nov 9, 2025Updated 5 months ago
Alternatives and similar repositories for RMML
Users that are interested in RMML are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆102Aug 15, 2025Updated 7 months ago
- ☆105Jul 5, 2025Updated 9 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- ☆12Mar 28, 2026Updated last week
- ☆74Apr 8, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- A collection of tools, scripts and personal research☆157Mar 25, 2026Updated 2 weeks ago
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 3 years ago
- A repository to share publicly available Velociraptor detection content☆199Mar 29, 2026Updated last week
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Dec 6, 2025Updated 4 months ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- PowerShell ETW consumer module☆31May 21, 2025Updated 10 months ago
- ☆22Mar 4, 2025Updated last year
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated last month
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- ☆54May 14, 2024Updated last year
- ☆79Sep 29, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆93Aug 30, 2024Updated last year
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 2 months ago
- ☆183Apr 24, 2025Updated 11 months ago
- Rules generated from our investigations.☆207Jun 17, 2025Updated 9 months ago
- ☆255Jun 7, 2025Updated 10 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 2 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,315Apr 3, 2026Updated last week