Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   892

Open Source NamzEDR

by Namz_Coder - 22 December, 2025 - 05:05 AM
This post is by a banned member (Namz_Coder) - Unhide
44
Posts
4
Threads
#1
Namz_EDR
Namz_EDR is an Endpoint Detection and Response (EDR) tool written in Python for Windows systems. It is designed to help security analysts and system administrators detect, analyze, and respond to suspicious activities and potential threats on endpoints.
Features
  • Process Monitoring: Detects suspicious or malicious processes running on the system.
  • Persistence Mechanism Detection: Scans for common persistence techniques such as registry autoruns, scheduled tasks, and WMI event subscriptions.
  • WMI Persistence Scan: Identifies suspicious WMI event filters and consumers.
  • Anti-Forensics Detection: Looks for signs of timestomping and other anti-forensics techniques.
  • Network Connections: Lists active network connections and highlights potentially suspicious activity.
  • File System Scanning: Checks for suspicious files and directories.
  • Logging: Provides detailed logs for all findings and actions.
Requirements
  • Windows OS
  • Python 3.7 or higher
  • Required Python packages (see below)
Usage
Run the tool from the command line:
python Namz_EDR.py
The script will perform a series of security checks and display/log the results.
Disclaimer
 
This tool is intended for educational and research purposes only. Use it responsibly and only on systems you own or have explicit permission to analyze.
 
Contributing
 
Contributions are welcome! Please open issues or submit pull requests for improvements or bug fixes.
Hidden Content
You must register or login to view this content.

This post is by a banned member (trxHerbert) - Unhide
195
Posts
0
Threads
#2
+rep thanks for this leak so much i need it fast
This post is by a banned member (kik0) - Unhide
kik0  
Registered
19
Posts
0
Threads
#3
(22 December, 2025 - 05:05 AM)Namz_Coder Wrote: Show More
Namz_EDR
Namz_EDR is an Endpoint Detection and Response (EDR) tool written in Python for Windows systems. It is designed to help security analysts and system administrators detect, analyze, and respond to suspicious activities and potential threats on endpoints.
Features
  • Process Monitoring: Detects suspicious or malicious processes running on the system.
  • Persistence Mechanism Detection: Scans for common persistence techniques such as registry autoruns, scheduled tasks, and WMI event subscriptions.
  • WMI Persistence Scan: Identifies suspicious WMI event filters and consumers.
  • Anti-Forensics Detection: Looks for signs of timestomping and other anti-forensics techniques.
  • Network Connections: Lists active network connections and highlights potentially suspicious activity.
  • File System Scanning: Checks for suspicious files and directories.
  • Logging: Provides detailed logs for all findings and actions.
Requirements
  • Windows OS
  • Python 3.7 or higher
  • Required Python packages (see below)
Usage
Run the tool from the command line:
python Namz_EDR.py
The script will perform a series of security checks and display/log the results.
Disclaimer
 
This tool is intended for educational and research purposes only. Use it responsibly and only on systems you own or have explicit permission to analyze.
 
Contributing
 
Contributions are welcome! Please open issues or submit pull requests for improvements or bug fixes.

Thanks for the
This post is by a banned member (bitachonssl) - Unhide
20
Posts
0
Threads
#4
(22 December, 2025 - 05:05 AM)Namz_Coder Wrote: Show More
Namz_EDR
Namz_EDR is an Endpoint Detection and Response (EDR) tool written in Python for Windows systems. It is designed to help security analysts and system administrators detect, analyze, and respond to suspicious activities and potential threats on endpoints.
Features
  • Process Monitoring: Detects suspicious or malicious processes running on the system.
  • Persistence Mechanism Detection: Scans for common persistence techniques such as registry autoruns, scheduled tasks, and WMI event subscriptions.
  • WMI Persistence Scan: Identifies suspicious WMI event filters and consumers.
  • Anti-Forensics Detection: Looks for signs of timestomping and other anti-forensics techniques.
  • Network Connections: Lists active network connections and highlights potentially suspicious activity.
  • File System Scanning: Checks for suspicious files and directories.
  • Logging: Provides detailed logs for all findings and actions.
Requirements
  • Windows OS
  • Python 3.7 or higher
  • Required Python packages (see below)
Usage
Run the tool from the command line:
python Namz_EDR.py
The script will perform a series of security checks and display/log the results.
Disclaimer
 
This tool is intended for educational and research purposes only. Use it responsibly and only on systems you own or have explicit permission to analyze.
 
Contributing
 
Contributions are welcome! Please open issues or submit pull requests for improvements or bug fixes.
 

thank for this
This post is by a banned member (swissxd) - Unhide
swissxd  
Registered
32
Posts
0
Threads
#5
(22 December, 2025 - 05:05 AM)Namz_Coder Wrote: Show More
Namz_EDR
Namz_EDR is an Endpoint Detection and Response (EDR) tool written in Python for Windows systems. It is designed to help security analysts and system administrators detect, analyze, and respond to suspicious activities and potential threats on endpoints.
Features
  • Process Monitoring: Detects suspicious or malicious processes running on the system.
  • Persistence Mechanism Detection: Scans for common persistence techniques such as registry autoruns, scheduled tasks, and WMI event subscriptions.
  • WMI Persistence Scan: Identifies suspicious WMI event filters and consumers.
  • Anti-Forensics Detection: Looks for signs of timestomping and other anti-forensics techniques.
  • Network Connections: Lists active network connections and highlights potentially suspicious activity.
  • File System Scanning: Checks for suspicious files and directories.
  • Logging: Provides detailed logs for all findings and actions.
Requirements
  • Windows OS
  • Python 3.7 or higher
  • Required Python packages (see below)
Usage
Run the tool from the command line:
python Namz_EDR.py
The script will perform a series of security checks and display/log the results.
Disclaimer
 
This tool is intended for educational and research purposes only. Use it responsibly and only on systems you own or have explicit permission to analyze.
 
Contributing
 
Contributions are welcome! Please open issues or submit pull requests for improvements or bug fixes.
 
+rep thanks

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)