Renamed to Free EDR to avoid confusion with Comodo's project
☆26May 29, 2023Updated 2 years ago
Alternatives and similar repositories for OpenEDR
Users that are interested in OpenEDR are comparing it to the libraries listed below
Sorting:
- Repository to place any and all scripts made to solve CTF challenges. Why solve what's already been solved?☆13Nov 12, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated 2 weeks ago
- MWDB exercises☆20Jan 21, 2025Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- ☆29Nov 14, 2022Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Fork & modify of Wireguard's Memmod☆33Aug 2, 2023Updated 2 years ago
- ☆19Updated this week
- ☆78Oct 18, 2022Updated 3 years ago
- Winhttpclient is an interface which packaged with WinHTTP API written in c.☆13Jan 22, 2023Updated 3 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- ☆12Aug 4, 2018Updated 7 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- Golang tool to dump useful information from a Mach-O binary☆39Oct 20, 2023Updated 2 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 9 years ago
- My home server infrastructure as code☆16Updated this week
- 🤖 Configuración de nvim para Windows☆10Oct 26, 2022Updated 3 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- A place to reborn☆60Nov 13, 2022Updated 3 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- Automate Entitlement Management in Azure AD Identity Governance using Microsoft Graph Powershell☆15Sep 13, 2023Updated 2 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- ☆17Jan 11, 2025Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Nov 10, 2024Updated last year
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Jun 15, 2024Updated last year
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Mar 5, 2021Updated 4 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Performance comparison of ClickHouse vs PostgreSQL using LLM-style query patterns on realistic aircraft tracking data☆13Aug 13, 2025Updated 6 months ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago