Collection of tool you need to have in your Endpoint Detection and Response arsenal
☆114Mar 22, 2024Updated 2 years ago
Alternatives and similar repositories for awesome-endpoint-detection-and-response
Users that are interested in awesome-endpoint-detection-and-response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open EDR public repository☆2,623Jan 13, 2024Updated 2 years ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- ☆40Feb 12, 2026Updated last month
- Open Source EDR for Windows☆1,297Feb 25, 2023Updated 3 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 8 months ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 5 months ago
- Simple username generator based on a list of name and surname☆13May 20, 2021Updated 4 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated 2 months ago
- ☆23Nov 29, 2023Updated 2 years ago
- Time limited, auto-expiring group memberships for users on Google Cloud☆14Mar 29, 2022Updated 3 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Sep 17, 2020Updated 5 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- ☆15Dec 22, 2021Updated 4 years ago
- Detect strange memory regions and DLLs☆190Jan 20, 2022Updated 4 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆20Jan 9, 2026Updated 2 months ago
- An Active Defense and EDR software to empower Blue Teams☆1,316Aug 10, 2023Updated 2 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆298Updated this week
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- About the ETHOS open source initiative☆25Apr 26, 2023Updated 2 years ago
- Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-Cradle…☆316Oct 21, 2021Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- GPT fdisk partitioning tool for use under UEFI environments.☆17Nov 27, 2024Updated last year
- ☆12Nov 12, 2023Updated 2 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- The MITRE ATT&CK Mapping Datasets☆20Jan 23, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- OSSEM Data Dictionaries☆65Jan 22, 2025Updated last year
- External Hack for Aura Kingdom TO☆14Feb 17, 2023Updated 3 years ago
- Legacy Sigma Tools (sigmac etc.)☆16May 7, 2023Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago