The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.
☆24Aug 12, 2025Updated 6 months ago
Alternatives and similar repositories for Crowdstrike-Deploy
Users that are interested in Crowdstrike-Deploy are comparing it to the libraries listed below
Sorting:
- A tool for fetching DFIR and other GitHub tools.☆25Aug 2, 2025Updated 7 months ago
- ☆28Oct 15, 2025Updated 4 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- ☆21Jul 29, 2019Updated 6 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated 10 months ago
- USN Journal full path builder☆65Sep 16, 2024Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆34Aug 7, 2024Updated last year
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manne…☆40Sep 26, 2025Updated 5 months ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆22Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- ☆10Jul 1, 2023Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- My stuff regarding Copilot for Security☆12Jan 12, 2026Updated last month
- ☆12Apr 1, 2023Updated 2 years ago
- VirtualGHOST Detection Tool☆110Dec 3, 2025Updated 3 months ago
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated 3 weeks ago
- These books are pulled from # List of Free Learning Resources [ for .LRC files.☆11Oct 27, 2023Updated 2 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- ☆12Apr 20, 2025Updated 10 months ago
- ☆14Dec 6, 2023Updated 2 years ago
- ☆13Jan 24, 2025Updated last year
- ☆13Jan 23, 2026Updated last month
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- The course cryptographic systems and their weaknesses in the University of Oulu☆10Jan 8, 2026Updated last month
- ☆52Feb 8, 2024Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year