A comprehensive PowerShell-based threat hunting and incident response framework for Windows environments, built around Sysmon event analysis and forensic investigation capabilities.
☆51Jul 17, 2025Updated 8 months ago
Alternatives and similar repositories for Garuda-framework
Users that are interested in Garuda-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆36Jul 7, 2025Updated 9 months ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆37Mar 30, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆12May 8, 2020Updated 5 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆94Apr 23, 2025Updated 11 months ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated this week
- Meeting notes☆14Apr 5, 2016Updated 10 years ago
- Logbook for Digital Forensics and Incident Response☆11Jan 21, 2022Updated 4 years ago
- Your Open-Source SOC Assistant☆12Apr 5, 2023Updated 3 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 3 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆75Sep 13, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Nov 8, 2021Updated 4 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆41Oct 24, 2025Updated 5 months ago
- AWS X-Ray for Covert Command & Control☆45Oct 13, 2025Updated 6 months ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- This Python tool uses PimEyes for reverse image searches, returning links to pages where matches are found, useful for investigations and…☆12Sep 12, 2024Updated last year
- ☆14Jul 26, 2025Updated 8 months ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Mar 24, 2026Updated 3 weeks ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- An Arduino board configuration for a Nano clone with an ATmega328PB incl. Bootloader☆11Aug 12, 2020Updated 5 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated 3 weeks ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- Custom dyld version inherited from original Apple dyld implementation☆23Apr 27, 2024Updated last year
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ludus range for the Constructing Defense Lab☆117Apr 5, 2026Updated last week
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆22Jun 29, 2025Updated 9 months ago
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- Drones Logs Events And Properties Parser☆16Mar 28, 2024Updated 2 years ago
- opensource NPU for LLM inference (this run gpt2)☆63Feb 16, 2026Updated last month
- Code samples showing how to include data stored in Backblaze B2 in a RAG application☆11Sep 18, 2024Updated last year