☆74Feb 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for EDR-Telemetry-Website
Users that are interested in EDR-Telemetry-Website are comparing it to the libraries listed below
Sorting:
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,927Jan 20, 2026Updated last month
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Nov 20, 2024Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆43Apr 14, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆147Jul 17, 2025Updated 7 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- MCP to help Defenders Detection Engineer Harder and Smarter☆252Updated this week
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- ☆65Mar 15, 2024Updated last year
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- ☆77Feb 4, 2026Updated 3 weeks ago
- Tool to extract powerful tokens from Office desktop apps memory☆74Mar 1, 2024Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆64Jan 21, 2025Updated last year
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆393Feb 9, 2026Updated 3 weeks ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆23May 27, 2024Updated last year
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- ☆12Feb 9, 2025Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆15Oct 29, 2024Updated last year
- ☆11Aug 7, 2021Updated 4 years ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- ☆14Jun 27, 2024Updated last year
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 10 months ago
- God Mode Detection Rules☆133Aug 8, 2024Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response ca…☆323Oct 12, 2025Updated 4 months ago