AppLocker Policy Generator
☆25Aug 25, 2025Updated 6 months ago
Alternatives and similar repositories for AppLockerGen
Users that are interested in AppLockerGen are comparing it to the libraries listed below
Sorting:
- ☆77Feb 4, 2026Updated 3 weeks ago
- Bring runZero Exposure Management into BloodHound☆44Nov 19, 2025Updated 3 months ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆30Jul 7, 2025Updated 7 months ago
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 4 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆66Jan 12, 2026Updated last month
- ☆102Aug 4, 2025Updated 6 months ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆37Nov 4, 2024Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Feb 19, 2026Updated last week
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specific…☆107Feb 21, 2026Updated last week
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆115Jan 29, 2026Updated last month
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆104Jan 26, 2026Updated last month
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆174Aug 13, 2025Updated 6 months ago
- Group Policy Objects manipulation and exploitation framework☆292Dec 7, 2025Updated 2 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Feb 22, 2026Updated last week
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated 11 months ago
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 3 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- ☆20Dec 24, 2025Updated 2 months ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- ☆42Dec 24, 2024Updated last year
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆95Dec 28, 2025Updated 2 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆158Jun 24, 2025Updated 8 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- brewpkg☆17Sep 30, 2025Updated 5 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆81Sep 11, 2025Updated 5 months ago
- ☆23Jun 28, 2025Updated 8 months ago