cbecks2 / edr-artifactsLinks
This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.
☆80Updated 9 months ago
Alternatives and similar repositories for edr-artifacts
Users that are interested in edr-artifacts are comparing it to the libraries listed below
Sorting:
- Persist like a Dodder☆61Updated last month
- ☆81Updated 7 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆45Updated this week
- Detect WFP filters blocking EDR communications☆91Updated last year
- ☆37Updated last year
- ☆24Updated 4 months ago
- Yara Rules for Modern Malware☆77Updated last year
- ☆73Updated last week
- Adversary Emulation Framework☆109Updated 11 months ago
- a tiny program to consume from ETW providers for research☆49Updated 5 months ago
- Living off the land searches for explorer and sharepoint☆86Updated last month
- BloodHound PowerShell client☆56Updated 2 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated last year
- Source code and examples for PassiveAggression☆61Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆39Updated 6 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆93Updated last year
- ☆151Updated 4 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated 11 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆19Updated 5 months ago
- Default Detections for EDR☆96Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 11 months ago
- ☆155Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- Living Off the Foreign Land setup scripts☆70Updated 3 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Deploy a phishing infrastructure on the fly.☆69Updated 6 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆205Updated 5 months ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago