JakubStanior / PsExclusionFinderView external linksLinks
PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user
☆12Oct 14, 2024Updated last year
Alternatives and similar repositories for PsExclusionFinder
Users that are interested in PsExclusionFinder are comparing it to the libraries listed below
Sorting:
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- A portable bridge between your C2 infrastructure and Discord, built for quick and lightweight operations.☆12Jun 3, 2025Updated 8 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- a minimalistic winrm client written in python☆25May 15, 2025Updated 8 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- ☆154Oct 2, 2025Updated 4 months ago
- ip-keyloger☆10Jan 9, 2026Updated last month
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- A Python backdoor for spying on Windows machines☆10Apr 21, 2022Updated 3 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Jan 19, 2026Updated 3 weeks ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆11Feb 7, 2022Updated 4 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- my knowledge of linux privilege escalation☆10Oct 14, 2023Updated 2 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16May 11, 2021Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- ☆12Dec 23, 2023Updated 2 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago