VirtualGHOST Detection Tool
☆110Dec 3, 2025Updated 3 months ago
Alternatives and similar repositories for VirtualGHOST
Users that are interested in VirtualGHOST are comparing it to the libraries listed below
Sorting:
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- ☆19Jan 31, 2025Updated last year
- ☆14Jul 9, 2024Updated last year
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 2 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 4 years ago
- ☆75Mar 19, 2025Updated 11 months ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 3 months ago
- ☆27May 6, 2024Updated last year
- A series of python scripts to extract information from SQLite Data Files☆21Nov 15, 2025Updated 3 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆24Aug 12, 2025Updated 6 months ago
- Examine Chrome extensions for security issues☆95Nov 16, 2025Updated 3 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆169Jun 29, 2025Updated 8 months ago
- PowerShell module for Office 365 and Azure log collection☆279Sep 22, 2025Updated 5 months ago
- Powershell module for VMWare vSphere forensics☆167Nov 8, 2024Updated last year
- Detect WFP filters blocking EDR communications☆96Jan 5, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,253Jul 22, 2025Updated 7 months ago
- USN Journal full path builder☆65Sep 16, 2024Updated last year
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- ☆23Sep 20, 2024Updated last year
- SentinelOne Windows Installation Diagnostic☆11Apr 14, 2025Updated 10 months ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 3 months ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Jun 21, 2024Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆205Nov 23, 2025Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Blocks drivers from loading by using a name collision technique. #nsacyber☆50Dec 18, 2017Updated 8 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago