arekfurt / WinAWLView external linksLinks
☆18Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for WinAWL
Users that are interested in WinAWL are comparing it to the libraries listed below
Sorting:
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Sep 29, 2018Updated 7 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- PowerShell SecretManagement module for DPAPI-NG☆30Sep 12, 2025Updated 5 months ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Nov 30, 2018Updated 7 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆64Dec 18, 2023Updated 2 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Resources for our Active Directory security workshops☆141Sep 9, 2021Updated 4 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆17Jul 26, 2025Updated 6 months ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- ☆82Dec 29, 2020Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Dec 8, 2022Updated 3 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- A collection of code (mostly Jupyter notebooks) associated with entries on my blog☆12Oct 8, 2017Updated 8 years ago
- CORS checking☆34Jul 16, 2018Updated 7 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- A protovis visualization of the linked open data cloud.☆26Jul 25, 2011Updated 14 years ago
- Code for drought detection and attribution using tree-ring reconstructions☆11Feb 19, 2019Updated 6 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- The lazy way to run multi-statement Neo4j Cypher scripts from the web☆11Nov 21, 2016Updated 9 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- PowerShellUtilities provides various utility commandlets.☆51Aug 3, 2020Updated 5 years ago