Am0rphous / PowerShellLinks
🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼
☆50Updated 5 months ago
Alternatives and similar repositories for PowerShell
Users that are interested in PowerShell are comparing it to the libraries listed below
Sorting:
- COMPLETE OSINT CHEAT-SHEET☆120Updated 3 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 3 years ago
- Windows Exploit Protection Settings (Ultimate) GUI☆74Updated 3 weeks ago
- NetProbe: Network Probe☆172Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆92Updated 2 weeks ago
- A web scrape of Darknetlive. Incognito Market admin has removed the news page. This scrape has everything including the news.☆31Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆52Updated 9 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- ☆44Updated last year
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆101Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Automated solution for nmap'ing☆27Updated 2 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- DPULSE - Tool for complex approach to domain OSINT☆158Updated 2 weeks ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Updated this week
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆72Updated this week
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆77Updated this week
- Scripts and piece of codes used for Active Directory configuration☆83Updated 2 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Updated last month
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆77Updated 2 weeks ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- Some settings stolen from multiple scripts @ZephrFish☆132Updated last month
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- ☆142Updated 7 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Updated 11 months ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆56Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 5 months ago
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆92Updated 2 months ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆90Updated 8 months ago