Elastic Security detection content for Endpoint
☆1,421Apr 30, 2026Updated this week
Alternatives and similar repositories for protections-artifacts
Users that are interested in protections-artifacts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆2,563Updated this week
- ☆552Dec 4, 2023Updated 2 years ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆525Dec 22, 2025Updated 4 months ago
- Aims to identify sleeping beacons☆667Jan 25, 2026Updated 3 months ago
- YARA signature and IOC database for my scanners and tools☆2,931Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,951Apr 28, 2026Updated last week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆1,014Jun 4, 2024Updated last year
- ☆2,187Apr 3, 2026Updated last month
- Main Sigma Rule Repository☆10,386Updated this week
- Windows Events Attack Samples☆2,555Jan 24, 2023Updated 3 years ago
- ReversingLabs YARA Rules☆911Nov 3, 2025Updated 6 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆869Jan 20, 2022Updated 4 years ago
- Open Source EDR for Windows☆1,301Feb 25, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Hunts out CobaltStrike beacons and logs operator command output☆960Sep 4, 2024Updated last year
- ☆1,134Dec 19, 2023Updated 2 years ago
- Situational Awareness commands implemented using Beacon Object Files☆1,783Mar 10, 2026Updated last month
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,108Dec 11, 2024Updated last year
- Remote operations commands implemented using Beacon Object Files☆1,154Mar 5, 2026Updated last month
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,413Nov 22, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,534Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆821Apr 18, 2026Updated 2 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- ☆1,812Aug 30, 2024Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,974Apr 23, 2026Updated last week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆626Dec 8, 2025Updated 4 months ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆535Aug 1, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,627Jul 31, 2024Updated last year
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆263May 9, 2024Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆806Apr 6, 2026Updated 3 weeks ago
- Adversary Emulation Framework☆11,110Updated this week
- A BOF that runs unmanaged PEs inline☆695Oct 23, 2024Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆749Jul 22, 2023Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,982Apr 28, 2026Updated last week
- EDR Lab for Experimentation Purposes☆1,442Mar 1, 2026Updated 2 months ago