Elastic Security detection content for Endpoint
☆1,399Apr 10, 2026Updated this week
Alternatives and similar repositories for protections-artifacts
Users that are interested in protections-artifacts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆2,546Updated this week
- ☆552Dec 4, 2023Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆517Dec 22, 2025Updated 3 months ago
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- YARA signature and IOC database for my scanners and tools☆2,910Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,944Mar 26, 2026Updated 2 weeks ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,849Nov 3, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,009Jun 4, 2024Updated last year
- ☆2,178Apr 3, 2026Updated last week
- Main Sigma Rule Repository☆10,309Apr 1, 2026Updated 2 weeks ago
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆867Jan 20, 2022Updated 4 years ago
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 5 months ago
- Open Source EDR for Windows☆1,298Feb 25, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,081Dec 11, 2024Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆955Sep 4, 2024Updated last year
- ☆1,133Dec 19, 2023Updated 2 years ago
- Situational Awareness commands implemented using Beacon Object Files☆1,767Mar 10, 2026Updated last month
- The swiss army knife of LSASS dumping☆2,086Sep 17, 2024Updated last year
- Remote operations commands implemented using Beacon Object Files☆1,146Mar 5, 2026Updated last month
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,509Apr 1, 2026Updated last week
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,409Nov 22, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆1,803Aug 30, 2024Updated last year
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,959Apr 5, 2026Updated last week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,406Nov 7, 2024Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆621Dec 8, 2025Updated 4 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆533Aug 1, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 3 months ago
- ☆262May 9, 2024Updated last year
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Apr 6, 2026Updated last week
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,616Jul 31, 2024Updated last year
- Adversary Emulation Framework☆10,986Updated this week
- EDR Lab for Experimentation Purposes☆1,430Mar 1, 2026Updated last month
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Apr 8, 2026Updated last week
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆744Jul 22, 2023Updated 2 years ago
- Documentation and scripts to properly enable Windows event logs.☆688Oct 3, 2025Updated 6 months ago