Sysmon Config Pusher - Modernized
☆34Jan 7, 2026Updated 2 months ago
Alternatives and similar repositories for SysmonConfigPusher2
Users that are interested in SysmonConfigPusher2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- PHP 8 Sandbox Escape☆68Feb 28, 2026Updated 3 weeks ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 5 months ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- ☆20Mar 6, 2026Updated 2 weeks ago
- ☆13Sep 23, 2023Updated 2 years ago
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆58Feb 26, 2026Updated 3 weeks ago
- ☆19Jan 8, 2026Updated 2 months ago
- Talk slides and material☆38Mar 24, 2024Updated last year
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- Security scanning tool that integrates with Veeam Backup & Replication to perform vulnerability assessments on backup data without needin…☆13Aug 5, 2025Updated 7 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- 🛡️ Open-source binary protection toolkit for Windows PE. Nanomite, VM protection, anti-debug, and more.☆58Feb 8, 2026Updated last month
- This script validates the most common Conditional Access policies in Microsoft 365.☆10May 27, 2024Updated last year
- ☆50Nov 14, 2025Updated 4 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆40Dec 5, 2025Updated 3 months ago
- ☆11Jun 15, 2022Updated 3 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- ☆16Mar 22, 2023Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Packer.io automation of the vEOS nodes☆29Oct 3, 2022Updated 3 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- ☆20May 18, 2022Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- ☆28Feb 16, 2023Updated 3 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- AzureLogLibrary - repository used for Azure logging with ARM-templates, scripts, documentation to deploy DCRs, extensions, etc☆14Aug 11, 2023Updated 2 years ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated 11 months ago
- ☆27Oct 1, 2025Updated 5 months ago
- Windows and macOS Hardening Interface to make security more accessible.☆37Jan 24, 2022Updated 4 years ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆96Jan 27, 2026Updated last month
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- POC for CVE-2025-54918 and a technical demonstration.☆56Jan 12, 2026Updated 2 months ago