Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads
☆318Oct 21, 2021Updated 4 years ago
Alternatives and similar repositories for EDR-Testing-Script
Users that are interested in EDR-Testing-Script are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Active Defense and EDR software to empower Blue Teams☆1,331Mar 31, 2026Updated last month
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- Windows Events Attack Samples☆2,560Jan 24, 2023Updated 3 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Nov 28, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- Open Source EDR for Windows☆1,304Feb 25, 2023Updated 3 years ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- Also known by Microsoft as Knifecoat☆1,146Dec 22, 2022Updated 3 years ago
- ☆1,094May 1, 2019Updated 7 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆845Feb 23, 2026Updated 2 months ago
- Open EDR public repository☆2,660Jan 13, 2024Updated 2 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆812Updated this week
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,183Jul 26, 2023Updated 2 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆853Mar 23, 2018Updated 8 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆824Jul 8, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automated Adversary Emulation Platform☆6,965Updated this week
- ☆2,585Updated this week
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆153Jan 7, 2019Updated 7 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆652Jun 19, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆814Jan 14, 2026Updated 4 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,570Apr 24, 2026Updated 3 weeks ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- ☆1,815Aug 30, 2024Updated last year
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆941Dec 12, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- EventList☆379Mar 21, 2021Updated 5 years ago
- ☆837Jun 1, 2023Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Utilities for Sysmon☆1,644Apr 4, 2026Updated last month
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,345Dec 13, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- ☆13Oct 7, 2019Updated 6 years ago