TmmmmmR / WinEnumLinks
Toolkit to detected abnormal activities on a Windows machine.
☆11Updated 9 years ago
Alternatives and similar repositories for WinEnum
Users that are interested in WinEnum are comparing it to the libraries listed below
Sorting:
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- ☆12Updated 4 years ago
- \ PowerAvails Powershell /☆12Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆31Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Mainframe bruter and screen automation utility.☆20Updated 3 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆30Updated 6 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 9 years ago
- ☆22Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- module for certexfil☆15Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Basic file metadata gathering script☆21Updated 2 months ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- ☆26Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago