jorritfolmer / EDRevalsView external linksLinks
Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard Spider + Sandworm)
☆19Sep 5, 2022Updated 3 years ago
Alternatives and similar repositories for EDRevals
Users that are interested in EDRevals are comparing it to the libraries listed below
Sorting:
- SqlServer Linked Password Dumper.☆16Apr 28, 2017Updated 8 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Installs And Executes Shellcode☆11Jul 26, 2015Updated 10 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 4 months ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 2 weeks ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- C# DCOM Execution☆18Aug 4, 2019Updated 6 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 2 months ago
- 搜索几个网站的云盘资源,并过滤到失效链接,最后不保证资源的有效性☆20Jun 25, 2018Updated 7 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Dec 11, 2020Updated 5 years ago
- One CTF Platform☆20Dec 4, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- ☆11Feb 9, 2023Updated 3 years ago
- General Content☆25Dec 23, 2025Updated last month
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Jun 21, 2025Updated 7 months ago
- ☆26Jun 22, 2022Updated 3 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Jun 28, 2025Updated 7 months ago
- Event Data Collector☆40Jan 12, 2026Updated last month
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 6 years ago
- 一款急速菜刀一句话密码破解工具☆33Aug 14, 2019Updated 6 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41May 3, 2021Updated 4 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- ☆35Jun 30, 2020Updated 5 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- ChatterBot: Machine learning in Python ChatterBot ChatterBot is a machine-learning based conversational dialog engine build in Python whi…☆11Dec 18, 2019Updated 6 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- A specialized C# memory-accessing library☆43Feb 3, 2019Updated 7 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Aug 12, 2024Updated last year