ayeskatalas / Sophos-Removal-Tool
Tool to remove all versions of Sophos AV\Endpoint Defense
☆25Updated last year
Alternatives and similar repositories for Sophos-Removal-Tool:
Users that are interested in Sophos-Removal-Tool are comparing it to the libraries listed below
- Searching .evtx logs for remote connections☆24Updated last year
- ☆21Updated last year
- ☆21Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 10 months ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- A collection of my presentation materials.☆16Updated 9 months ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆15Updated 3 weeks ago
- Simple and sane cryptographic wrapper library.☆26Updated last year
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- ☆35Updated 8 months ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- ☆7Updated last year
- ☆14Updated 10 months ago
- ☆35Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆36Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ☆17Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆11Updated last month