The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.
☆24Aug 12, 2025Updated 8 months ago
Alternatives and similar repositories for Crowdstrike-Deploy
Users that are interested in Crowdstrike-Deploy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source HIDS tailored for Microsoft Windows and Active Directory☆30Feb 13, 2026Updated 2 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆162Apr 6, 2025Updated last year
- ☆13Mar 11, 2026Updated last month
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆28Oct 15, 2025Updated 5 months ago
- ☆12Apr 1, 2023Updated 3 years ago
- USN Journal full path builder☆68Apr 4, 2026Updated last week
- VirtualGHOST Detection Tool☆110Dec 3, 2025Updated 4 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- ☆34Oct 15, 2023Updated 2 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- ☆21Jul 29, 2019Updated 6 years ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Aug 7, 2024Updated last year
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- ☆49Apr 9, 2025Updated last year
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Jul 1, 2023Updated 2 years ago
- Convert Sigma rules to SIEM queries, directly in your browser.☆114Apr 3, 2026Updated last week
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 6 months ago
- TA505+ Adversary Simulation☆64Nov 30, 2020Updated 5 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆583Dec 6, 2025Updated 4 months ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆211Oct 19, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- KQL Queries for Advanced Hunting / Log Analytics☆13Jan 29, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆75Updated this week
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- ☆48Jun 6, 2025Updated 10 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆456Feb 18, 2026Updated last month
- ☆25Feb 18, 2025Updated last year
- This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manne…☆40Sep 26, 2025Updated 6 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago