YossiSassi / SEC-T_21-One-Liners-PowershellView external linksLinks
Code & other materials from SEC-T 2022 talk "When SysAdmin & Hacker Unite: 21 One-Liners to make you convert from bash to Powershell"
☆16Sep 17, 2022Updated 3 years ago
Alternatives and similar repositories for SEC-T_21-One-Liners-Powershell
Users that are interested in SEC-T_21-One-Liners-Powershell are comparing it to the libraries listed below
Sorting:
- Ransomware simulator written in C#☆37Jun 28, 2022Updated 3 years ago
- ☆53Oct 13, 2025Updated 4 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- Hackable Windows SandBox environment☆32Apr 20, 2023Updated 2 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- ezleague is a PHP Online Gaming League script☆10Apr 16, 2014Updated 11 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆92Sep 9, 2022Updated 3 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Intel(R) Distribution for GDB*☆15Jan 26, 2026Updated 2 weeks ago
- traefik stack for balenaCloud to proxy https domains to internal services☆11Oct 3, 2020Updated 5 years ago
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- blame Huy☆42Jan 3, 2021Updated 5 years ago
- A series of neural network implementations in Clojure, building up from a version with no external dependencies to a version using neande…☆12Jun 2, 2023Updated 2 years ago
- Uiua386 font but with color glyphs☆12Feb 10, 2024Updated 2 years ago
- OSCP preparation☆12Sep 18, 2025Updated 4 months ago
- ☆16Jun 15, 2025Updated 7 months ago
- Interact with Windows RPC Services over SMB using go-smb☆11Nov 18, 2025Updated 2 months ago
- VSCode Debug Adapter for Ravi / Lua 5.3☆14Aug 8, 2021Updated 4 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 8 months ago
- Emacs major mode for Uiua, a stack-based array language, powered by tree-sitter☆11Nov 21, 2025Updated 2 months ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated 11 months ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- ☆10Jan 8, 2019Updated 7 years ago
- ShadowDropper is a utility for covertly delivering and executing payloads on a target system.☆26Jul 4, 2025Updated 7 months ago
- Run ISP speed tests and save results☆10Jan 9, 2022Updated 4 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- ☆12Oct 19, 2024Updated last year
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 5 months ago