powershell script to simulate activity by a user
☆22Jul 29, 2020Updated 5 years ago
Alternatives and similar repositories for simple-user-simulation
Users that are interested in simple-user-simulation are comparing it to the libraries listed below
Sorting:
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Terraform playbook of a vulnerable Azure deployment☆11Apr 28, 2022Updated 3 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Apr 29, 2018Updated 7 years ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 7 years ago
- 🛀 remove private data and remap IP addresses in network packet captures☆19Sep 9, 2018Updated 7 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- ☆15Mar 15, 2026Updated last week
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- A guide on making your Kensington Expert Mouse Pro work fully under Linux☆21Feb 25, 2023Updated 3 years ago
- Personal Scoop bucket☆12Updated this week
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- POC about how to prevent windbg break☆15Oct 3, 2022Updated 3 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- ☆50May 12, 2021Updated 4 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆93Aug 3, 2025Updated 7 months ago
- A romhack of "The Legend of Zelda: A Link to the Past" made for speedrunners☆10Feb 16, 2026Updated last month
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Public Repo for Atomic Test Harness☆284Apr 8, 2025Updated 11 months ago
- Jboss Java Deserialization RCE (CVE-2017-12149)☆13Aug 22, 2019Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- ☆27Feb 3, 2026Updated last month
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Mar 8, 2026Updated last week
- ☆72Mar 31, 2022Updated 3 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Welcome to the hands-on resource hub for the Generative AI Development Environments Bootcamp. This repo is designed to help you explore d…☆26Oct 22, 2025Updated 4 months ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆70Oct 30, 2025Updated 4 months ago
- ☆109Oct 29, 2024Updated last year
- MPC Server for PySpark inpired by the LakeSail☆17Feb 26, 2026Updated 3 weeks ago
- Some of my drawings☆12May 6, 2022Updated 3 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆31Mar 7, 2026Updated 2 weeks ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago