The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.
☆24Aug 12, 2025Updated 8 months ago
Alternatives and similar repositories for Crowdstrike-Deploy
Users that are interested in Crowdstrike-Deploy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆31Feb 13, 2026Updated 2 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated last year
- ☆13Mar 11, 2026Updated last month
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 3 months ago
- ☆28Oct 15, 2025Updated 6 months ago
- ☆12Apr 1, 2023Updated 3 years ago
- USN Journal full path builder☆69Apr 16, 2026Updated 2 weeks ago
- VirtualGHOST Detection Tool☆110Dec 3, 2025Updated 5 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆34Oct 15, 2023Updated 2 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- ☆21Jul 29, 2019Updated 6 years ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Aug 7, 2024Updated last year
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆16Feb 1, 2021Updated 5 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Apr 18, 2026Updated 2 weeks ago
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 2 months ago
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 6 months ago
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆587Updated this week
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆211Oct 19, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- KQL Queries for Advanced Hunting / Log Analytics☆13Jan 29, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 4 months ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- ☆50Jun 6, 2025Updated 10 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆468Feb 18, 2026Updated 2 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- ☆25Feb 18, 2025Updated last year