lordsaibat / finding_windows_privilegesView external linksLinks
Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compromise if not evaluated. Privileges can override permission causing a gap of perceived effective permission.
☆10Mar 2, 2018Updated 7 years ago
Alternatives and similar repositories for finding_windows_privileges
Users that are interested in finding_windows_privileges are comparing it to the libraries listed below
Sorting:
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- A PowerShell module to assist in parsing and managing catalog files.☆22Jan 12, 2017Updated 9 years ago
- WER Server☆19Feb 26, 2017Updated 8 years ago
- Dump Windows PE file information in C☆24May 2, 2015Updated 10 years ago
- Credential Dumper☆79Feb 19, 2020Updated 5 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 8 months ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 4 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- This library is for simplified work with the sms-man.com API☆18Jan 18, 2022Updated 4 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Control your YNCA Yamaha AVR from the command line☆10Aug 21, 2015Updated 10 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 3 months ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- ☆11Oct 16, 2018Updated 7 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Angular Personal Resume And Portfolio Template☆11Jan 29, 2026Updated 2 weeks ago
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- ☆10Dec 28, 2015Updated 10 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- VideoReTalking-HQ is a high-quality video retalking tool for enhancing and synchronizing video frames with audio inputs using advanced fa…☆13Jun 13, 2024Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- ☆29Dec 11, 2025Updated 2 months ago
- Mac Address Flooding Script☆11Dec 9, 2015Updated 10 years ago
- Helper scripts to make maintaining packages using AU even easier☆12Mar 16, 2024Updated last year
- Rich editor tooling for CloudFormation Templates for various editors such as Visual Studio Code☆11Jan 7, 2023Updated 3 years ago
- ☆14May 1, 2018Updated 7 years ago
- ☆12Aug 23, 2019Updated 6 years ago