Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads
☆318Oct 21, 2021Updated 4 years ago
Alternatives and similar repositories for EDR-Testing-Script
Users that are interested in EDR-Testing-Script are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Active Defense and EDR software to empower Blue Teams☆1,318Mar 31, 2026Updated last week
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- Windows Events Attack Samples☆2,541Jan 24, 2023Updated 3 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,081Nov 28, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Invoke-LiveResponse☆150Feb 22, 2022Updated 4 years ago
- Open Source EDR for Windows☆1,298Feb 25, 2023Updated 3 years ago
- Re-play Security Events☆1,732Mar 20, 2024Updated 2 years ago
- Also known by Microsoft as Knifecoat☆1,151Dec 22, 2022Updated 3 years ago
- ☆1,090May 1, 2019Updated 6 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆843Feb 23, 2026Updated last month
- Open EDR public repository☆2,631Jan 13, 2024Updated 2 years ago
- ☆349Mar 19, 2021Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Updated this week
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,176Jul 26, 2023Updated 2 years ago
- Automated Adversary Emulation Platform☆6,868Apr 3, 2026Updated last week
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆821Jul 8, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- ☆2,546Updated this week
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆153Jan 7, 2019Updated 7 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆808Jan 14, 2026Updated 2 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,555Apr 3, 2026Updated last week
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆572Dec 12, 2021Updated 4 years ago
- ☆1,803Aug 30, 2024Updated last year
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- EventList☆378Mar 21, 2021Updated 5 years ago
- ☆830Jun 1, 2023Updated 2 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Utilities for Sysmon☆1,634Apr 4, 2026Updated last week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,343Dec 13, 2022Updated 3 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,771Mar 30, 2026Updated last week
- ☆13Oct 7, 2019Updated 6 years ago