ASR Configurator, Essentials and Atomic Testing
☆104Apr 14, 2025Updated 10 months ago
Alternatives and similar repositories for ASRGEN
Users that are interested in ASRGEN are comparing it to the libraries listed below
Sorting:
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- ☆21Jan 8, 2026Updated last month
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆23Mar 11, 2020Updated 5 years ago
- Sample queries and data as part of the Microsoft Press book, The Definitive Guide to KQL☆281Aug 28, 2024Updated last year
- ☆61Jun 24, 2023Updated 2 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated 2 weeks ago
- ☆36May 27, 2024Updated last year
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆63Feb 22, 2026Updated last week
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- ☆48Jun 6, 2025Updated 9 months ago
- ☆402Updated this week
- ☆30Aug 24, 2025Updated 6 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆432Feb 18, 2026Updated 2 weeks ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- ☆26Mar 11, 2025Updated 11 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆42Nov 13, 2025Updated 3 months ago
- ☆48Dec 5, 2025Updated 3 months ago
- Simple hunting script for suspicious M365 OAuth Apps☆321Sep 23, 2025Updated 5 months ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Feb 17, 2025Updated last year
- Miscellaneous Azure Sentinel files that don't fall into other categories.☆13Aug 23, 2021Updated 4 years ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆20Apr 27, 2025Updated 10 months ago
- ☆14Dec 10, 2021Updated 4 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year