clong / Post-ReformatLinks
A guide to setting up Windows and MacOS the way I like it
☆22Updated 3 months ago
Alternatives and similar repositories for Post-Reformat
Users that are interested in Post-Reformat are comparing it to the libraries listed below
Sorting:
- Just random powershell things I've put together.☆37Updated 5 months ago
- PowerShell scripts/GUI tools for the enterprise to harden Windows Defender Firewall via group policy (GPO). These can be used to enforce …☆66Updated 3 years ago
- Tony's collection of powershell scripts, typically geared toward cybersec☆34Updated this week
- incident response scripts☆19Updated 6 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Gather Open-Source Intelligence using PowerShell.☆177Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 3 years ago
- Submits multiple domains to VirusTotal API☆60Updated 4 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Find accounts using common and default passwords in Active Directory.☆70Updated 6 years ago
- ☆45Updated 2 years ago
- KITT - An Open Source PowerShell O365 Business Email Compromise Investigation Tool☆115Updated 5 years ago
- Python script to verify multiple email addresses for pwnage☆67Updated 5 years ago
- ☆15Updated 6 years ago
- ☆29Updated 9 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆116Updated 5 years ago
- PowerShell Script for Agentless Incident Response☆25Updated 7 years ago
- A collection of useful Powershell Scripts that I have created☆46Updated 8 years ago
- Aids in discovering HTTP and HTTPS connectivity issues. #nsacyber☆113Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- A series of GPO templates☆20Updated 8 years ago
- Fast incident overview☆40Updated 8 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆126Updated 6 years ago
- ☆39Updated 5 years ago
- Threathunt details for the Solarwinds compromise☆33Updated 4 years ago
- Automated forensics written in PowerShell☆34Updated 6 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆53Updated 3 weeks ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago