Simple PowerShell script to quickly add Windows Firewall Rules
☆18Sep 14, 2017Updated 8 years ago
Alternatives and similar repositories for FirewallRules
Users that are interested in FirewallRules are comparing it to the libraries listed below
Sorting:
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- ☆17Jan 9, 2025Updated last year
- Email-Recon-For-Linux☆12May 20, 2022Updated 3 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- ☆26Mar 6, 2025Updated 11 months ago
- Framework for modeling and researching C2 communications for developing efficient filtering and detection logic☆23Oct 24, 2024Updated last year
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- Powershell script to monitor a wireless adapter every second until it disconnects.☆14May 15, 2024Updated last year
- The CAPTCHA-resilient contact scraper.☆47Nov 18, 2025Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆36Oct 1, 2025Updated 5 months ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆36Jan 11, 2026Updated last month
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆261Feb 2, 2026Updated 3 weeks ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆42Jan 6, 2026Updated last month
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆10Feb 23, 2026Updated last week
- ☆11Aug 31, 2019Updated 6 years ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆41Sep 9, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- ☆10Jan 1, 2018Updated 8 years ago
- Proof of concept to see if more modern HTML reports can be made with PowerShell☆12Oct 10, 2021Updated 4 years ago
- Update Properties of an Active Directory User with au2mator - Self Service Portal☆12May 5, 2025Updated 9 months ago
- Remote Shadow Using Windows built in software☆12Dec 10, 2025Updated 2 months ago
- This bit of code scans over a folder set in a variable, then e-mails a set address if there are permissions for individual users.☆11Sep 12, 2016Updated 9 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Many useful ActiveDirectory and other admin-type utilities typical in a HelpDesk role.☆10Dec 27, 2023Updated 2 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago