HarmJ0y / WINspect
Powershell-based Windows Security Auditing Toolbox
☆10Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for WINspect
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 4 years ago
- PHP Phishing Framework☆28Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 9 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 4 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 7 years ago
- This repo contains Powershell scripts used for general hackery.☆8Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- ☆17Updated 10 months ago
- ☆24Updated 8 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Free Email Providers☆10Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Updated 6 years ago
- ☆12Updated 7 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆25Updated 7 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 7 years ago