helgeklein / ListUserWriteableDirectories
Scans the filesystem for directories that are user-writeable
☆11Updated 3 years ago
Alternatives and similar repositories for ListUserWriteableDirectories
Users that are interested in ListUserWriteableDirectories are comparing it to the libraries listed below
Sorting:
- Active Directory Group Policy analyzer☆14Updated 5 years ago
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Updated 2 years ago
- ☆45Updated 2 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- ☆23Updated 2 months ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Updated 3 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆32Updated last year
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Updated 9 months ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆35Updated 3 years ago
- Windows 10 Live Information viewer☆36Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Scripts and One-Liners☆22Updated 3 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Windows Security Logging☆43Updated 2 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆36Updated 2 weeks ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆17Updated 4 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆70Updated 5 months ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago
- ☆11Updated 3 years ago