Repository to handle issues with our free EDR agent Aurora Lite
☆28Nov 9, 2023Updated 2 years ago
Alternatives and similar repositories for aurora-agent-lite
Users that are interested in aurora-agent-lite are comparing it to the libraries listed below
Sorting:
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- pySigma Splunk backend☆41Mar 15, 2026Updated last week
- ☆15Sep 24, 2024Updated last year
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆19Mar 12, 2020Updated 6 years ago
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- The ultimate Java library for Troy Hunt's ';-- Have I Been Pwned (v3).☆14Feb 21, 2023Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- automating the zig release process☆11Nov 19, 2025Updated 4 months ago
- The Sigma command line interface based on pySigma☆181Feb 5, 2026Updated last month
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆17Dec 8, 2022Updated 3 years ago
- Authenticode for PNG files☆11Jun 8, 2020Updated 5 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- Docker build for autopsy☆22Apr 13, 2021Updated 4 years ago
- A script that automates a brute-force attack on a login page☆13Jul 14, 2018Updated 7 years ago
- Windows Event Log Knowledge Base☆31Dec 23, 2025Updated 2 months ago
- ☆11May 13, 2024Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- ☆16Aug 19, 2024Updated last year
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- ☆12Apr 5, 2025Updated 11 months ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Implementation of RC6 encryption and decryption in python.☆20Mar 11, 2017Updated 9 years ago
- Solutions to Problems from the Hackerrank Math 🧮 Domain.☆13Aug 4, 2022Updated 3 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- Thymeleaf JAWR Extension☆17Oct 30, 2023Updated 2 years ago
- Schedule a build at a later time.☆25Mar 5, 2026Updated 2 weeks ago
- ☆12Jun 5, 2024Updated last year
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated 2 years ago
- Svelte component for Material Design Icons☆13Jul 4, 2022Updated 3 years ago
- Modular & injectable foundation for building JVM microservices☆24Oct 12, 2022Updated 3 years ago
- Body Mass Index(BMI) application developed by go-chassis microservice framwork☆15Feb 26, 2019Updated 7 years ago
- CVE-2022-1040☆17Sep 25, 2022Updated 3 years ago