PowerShell Module to interact with VirusTotal
☆121Jan 16, 2020Updated 6 years ago
Alternatives and similar repositories for Posh-VirusTotal
Users that are interested in Posh-VirusTotal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆215Mar 29, 2021Updated 5 years ago
- ☆14Aug 28, 2016Updated 9 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,432Nov 16, 2023Updated 2 years ago
- ☆2,397Oct 14, 2023Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆894Aug 20, 2021Updated 4 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- ☆265Oct 25, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Various tools and scripts☆43Nov 30, 2022Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- PowerShell Module with Security cmdlets for security work☆450Feb 27, 2020Updated 6 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆940Dec 12, 2023Updated 2 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- A PowerShell module to query and install Windows updates.☆18Feb 15, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Simple script to display AD Replication topology in a graph☆17Dec 21, 2018Updated 7 years ago
- 🚀AutoRuns is a PowerShell module that will help do live incident response and enumerate autoruns artifacts that may be used by legitima…☆293Mar 29, 2026Updated 2 weeks ago
- Module for interact with ADMX and ADML files.☆21Oct 12, 2020Updated 5 years ago
- A repository for using windows event forwarding for incident detection and response☆1,310Sep 8, 2025Updated 7 months ago
- Demo project to demonstrate automatically publishing a NuGet package for a PowerShell project.☆20Aug 8, 2020Updated 5 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Random Tools☆851Oct 20, 2022Updated 3 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 4 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆884Nov 17, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆493Jul 29, 2017Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Send SYSLOG messages from PowerShell☆92Jul 24, 2024Updated last year
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,057Feb 17, 2022Updated 4 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆107Jul 2, 2017Updated 8 years ago