MiniEDR is a kernel-mode process monitor that logs creations & terminations via a named pipe. Built for research & learning, exploring Windows internals & EDR mechanisms!
☆18Feb 19, 2025Updated last year
Alternatives and similar repositories for MiniEDR
Users that are interested in MiniEDR are comparing it to the libraries listed below
Sorting:
- High Performance Java NoSQL Database & ORM☆11Feb 8, 2026Updated 3 weeks ago
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆21Feb 23, 2025Updated last year
- A curated list of awesome 🏧 hacking resources.☆17Dec 4, 2025Updated 3 months ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated last year
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 9 months ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 5 months ago
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 6 years ago
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Dont Gamble with Risk☆14Mar 4, 2024Updated 2 years ago
- Collection of Windows kernel driver examples, offering insights into Windows internals, rootkit evasion, and advanced driver development.☆12Nov 23, 2023Updated 2 years ago
- Dataset fingerprinting for AIBOM☆15Feb 18, 2026Updated 2 weeks ago
- A Go client for the AppsFlyer Server-to-Server Events API☆12Jan 20, 2021Updated 5 years ago
- hacking tools☆14Jan 29, 2023Updated 3 years ago
- ☆16May 29, 2024Updated last year
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- This repository is a Dockerized php application containing a LFI (Local File Inclusion) vulnerability which can lead to RCE (Remote Code …☆12Jun 16, 2022Updated 3 years ago
- ☆22Jun 2, 2025Updated 9 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- ☆20May 20, 2024Updated last year
- ☆18Jan 9, 2025Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- The Jolly Executioner - a simple command execution proxy☆16Jun 9, 2024Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Free VMware Workstation Pro 17 (Windows) & ESXI Pro (MacOS)full license keys. We've meticulously organized thousands of keys, catering t…☆24Jun 19, 2025Updated 8 months ago
- ☆13May 2, 2023Updated 2 years ago
- Command line tool to block websites that distract you and activate focus mode.☆18Jun 2, 2022Updated 3 years ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆14Feb 10, 2025Updated last year
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 5 months ago
- ☆16Sep 23, 2021Updated 4 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- Miscellaneous scripts☆15Jan 12, 2021Updated 5 years ago
- 子域名收集工具☆18Mar 26, 2025Updated 11 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ELK monitoring based on prometheus. Includes: elasticseatch plugin, prometheus rules, prometheus console. Just run and monitor your clust…☆13Jan 2, 2020Updated 6 years ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago