PowerShell Module to interact with VirusTotal
☆121Jan 16, 2020Updated 6 years ago
Alternatives and similar repositories for Posh-VirusTotal
Users that are interested in Posh-VirusTotal are comparing it to the libraries listed below
Sorting:
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A set of Splunk workflow action definitions to export field values to CyberChef for further analysis.☆13Jan 22, 2018Updated 8 years ago
- PowerShell module for creating and managing Sysinternals Sysmon config files.☆214Mar 29, 2021Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆893Aug 20, 2021Updated 4 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 7 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- ☆2,392Oct 14, 2023Updated 2 years ago
- Simple script to display AD Replication topology in a graph☆17Dec 21, 2018Updated 7 years ago
- A PowerShell module to query and install Windows updates.☆18Feb 15, 2019Updated 7 years ago
- Various tools and scripts☆43Nov 30, 2022Updated 3 years ago
- ☆31Dec 1, 2022Updated 3 years ago
- Random Tools☆850Oct 20, 2022Updated 3 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- PowerShell Module with Security cmdlets for security work☆448Feb 27, 2020Updated 6 years ago
- Powershell script to Mute the volume of system when the headphones are plugged out☆17May 23, 2017Updated 8 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- Ansible role to deploy Cyberark Password Vault Web Access☆20Dec 1, 2025Updated 3 months ago
- Module for interact with ADMX and ADML files.☆21Oct 12, 2020Updated 5 years ago
- 🚀AutoRuns is a PowerShell module that will help do live incident response and enumerate autoruns artifacts that may be used by legitima…☆289Jan 5, 2025Updated last year
- A repository for using windows event forwarding for incident detection and response☆1,299Sep 8, 2025Updated 5 months ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆883Nov 17, 2020Updated 5 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆937Dec 12, 2023Updated 2 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- PowerShell based module that can decode System Errors, Exit codes, port numbers, HTTP Statuses and more. This module can be used to quick…☆46Dec 17, 2018Updated 7 years ago
- ☆265Oct 25, 2025Updated 4 months ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- PowerShell tools for postmasters.☆23Nov 21, 2018Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Feb 9, 2026Updated 3 weeks ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Automated CyberArk Privileged Session Manager SSH Proxy Installer.☆13Apr 14, 2023Updated 2 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago