Cr0n1c / SCCM-EnumerationLinks
☆40Updated 9 years ago
Alternatives and similar repositories for SCCM-Enumeration
Users that are interested in SCCM-Enumeration are comparing it to the libraries listed below
Sorting:
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Updated 8 years ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Updated 9 years ago
- Sysmon configuration☆65Updated 6 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Updated 9 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Updated 10 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Updated 4 years ago
- Scripts for interacting with MSRC portal data☆77Updated 6 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆24Updated 9 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- This module is used to report phishing URLs to their WHOIS/RDAP abuse contact information.☆42Updated 7 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆200Updated 7 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- ☆23Updated 9 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- ☆52Updated 6 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115Updated 8 years ago
- ☆97Updated 9 years ago
- PowerShell script useful for Incident Response and security/configuration baselines for Windows Vista and later☆20Updated 9 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Presentation Slides☆27Updated 6 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Updated 9 years ago
- gpocheck☆30Updated 10 months ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Updated 2 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- Get all AD objects which are hidden from you☆18Updated 7 years ago
- Some security related PowerShell scripts I developed.☆79Updated 6 years ago