The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.
☆24Aug 12, 2025Updated 7 months ago
Alternatives and similar repositories for Crowdstrike-Deploy
Users that are interested in Crowdstrike-Deploy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated last month
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated 11 months ago
- A tool for fetching DFIR and other GitHub tools.☆26Aug 2, 2025Updated 7 months ago
- ☆28Oct 15, 2025Updated 5 months ago
- ☆12Apr 1, 2023Updated 2 years ago
- USN Journal full path builder☆67Sep 16, 2024Updated last year
- VirtualGHOST Detection Tool☆109Dec 3, 2025Updated 3 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- ☆34Oct 15, 2023Updated 2 years ago
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- ☆21Jul 29, 2019Updated 6 years ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆34Aug 7, 2024Updated last year
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆49Apr 9, 2025Updated 11 months ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.☆113Jan 24, 2026Updated 2 months ago
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 5 months ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆581Dec 6, 2025Updated 3 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆210Oct 19, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆60Updated this week
- KQL Queries for Advanced Hunting / Log Analytics☆13Jan 29, 2026Updated last month
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- ☆48Jun 6, 2025Updated 9 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆454Feb 18, 2026Updated last month
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago