A collection of tools, scripts and personal research
☆157Feb 2, 2026Updated last month
Alternatives and similar repositories for Misc-Research
Users that are interested in Misc-Research are comparing it to the libraries listed below
Sorting:
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- Event Tracing For Windows (ETW) Resources☆417Oct 30, 2025Updated 4 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,930Jan 20, 2026Updated last month
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆641Aug 4, 2025Updated 7 months ago
- ☆27May 1, 2023Updated 2 years ago
- Awesome Security lists for SOC/CERT/CTI☆1,263Updated this week
- ☆253Jun 7, 2025Updated 8 months ago
- Documentation and scripts to properly enable Windows event logs.☆672Oct 3, 2025Updated 5 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆407Aug 22, 2023Updated 2 years ago
- Practical Windows Forensics Training☆749Feb 16, 2026Updated 2 weeks ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆486Apr 17, 2025Updated 10 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated 2 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 3 months ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 3 months ago
- ☆224Oct 22, 2023Updated 2 years ago
- A dirty PoC for a reverse shell with cool features in Rust☆186Nov 25, 2025Updated 3 months ago
- Elastic Security detection content for Endpoint☆1,380Feb 26, 2026Updated last week
- ☆40Feb 4, 2023Updated 3 years ago
- Scan vulnerable drivers on Windows with loldrivers.io☆188Sep 11, 2023Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Hardcore Debugging☆933Jan 6, 2026Updated 2 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆411Jan 11, 2026Updated last month
- Select any exported function in a dll as the new dll's entry point.☆81Oct 25, 2024Updated last year
- ☆12Feb 9, 2025Updated last year