Windows productivity tweaks
☆15Feb 21, 2020Updated 6 years ago
Alternatives and similar repositories for winconfig
Users that are interested in winconfig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kali configuration optimized for red teaming/pentesting/CTFs☆21Oct 20, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- List, Kill, Suspend or Resume a process from command line☆20Jul 21, 2020Updated 5 years ago
- A tool to export Component Based Servicing packages.☆11Jan 22, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- Various scripts containing tweaks for optimizing certain areas of Windows 10/11☆10Dec 2, 2023Updated 2 years ago
- Windows 10 registry tweak performance hacks.☆10Jun 14, 2022Updated 3 years ago
- Security tool to quickly audit Public Box files and folders.☆54Sep 29, 2019Updated 6 years ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- The GitHub release of the "Windows 10 Tweaks and Debloat Project" (https://archive.codeplex.com/?p=windows10tweaksanddebloat) For which I…☆13May 27, 2020Updated 5 years ago
- Python based Docker for Eagle to MQTT reader☆14Jun 3, 2022Updated 3 years ago
- UFS2Tool - A FreeBSD UFS1/2 Filesystem Manager for Windows, macOS & Linux.☆48Mar 17, 2026Updated 3 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- GUI for Windows tweaks.☆15Nov 15, 2020Updated 5 years ago
- Small C# binary file patcher utility. The interesting bit is the byte pattern / mask based search and replace. (Created for educational p…☆18Aug 25, 2014Updated 11 years ago
- Run "whatever you want" as TrustedInstaller☆20Dec 1, 2018Updated 7 years ago
- How to make a Rounded Button in WPF☆10Aug 9, 2022Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Sample app to go with "Web Developers' HTTP Toolbox" workshop☆13Feb 26, 2019Updated 7 years ago
- Windows 10 Color Tweaker☆13Mar 11, 2019Updated 7 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- Returns results from Google search.☆52Dec 2, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Wraps github api for openly available information about an organization, user, or repo☆128May 22, 2023Updated 2 years ago
- Run cmd as Trusted Installer. Written in C☆24Nov 8, 2019Updated 6 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆31Feb 11, 2021Updated 5 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- Powerful BAML editor for .NET, built on dnlib☆20Sep 11, 2025Updated 6 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- How to change a Button Image on Mouse Over/Hover in WPF.☆12Aug 9, 2022Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Mar 21, 2019Updated 7 years ago
- Signature Spoofing on unsupported Android 11 ROMs☆10Aug 12, 2022Updated 3 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆13May 17, 2020Updated 5 years ago
- ☆11Oct 12, 2024Updated last year
- Lib for parsing web pages to find images in specified locations and downloading them simultaneously or sequentially. Picture downloader a…☆17Dec 12, 2013Updated 12 years ago
- How to de-google, increase the security and improve the privacy and usability of the Asus Zenfone via ADB☆18Mar 5, 2023Updated 3 years ago