A curated list of awesome Security Hardening techniques for Windows.
☆19Mar 1, 2017Updated 9 years ago
Alternatives and similar repositories for awesome-windows-domain-hardening
Users that are interested in awesome-windows-domain-hardening are comparing it to the libraries listed below
Sorting:
- zeus-style banking trojan☆14Mar 19, 2017Updated 9 years ago
- Ansible playbook to install cuckoo sandbox.☆11Mar 8, 2019Updated 7 years ago
- ☆16May 15, 2020Updated 5 years ago
- Malware exploits☆554Aug 22, 2025Updated 6 months ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆328Nov 12, 2016Updated 9 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- TP-LINK TL-WN722N-V1 (Atheros AR9271) Kext (Driver/Controller/Kernel Extension) for macOS☆18Feb 11, 2024Updated 2 years ago
- A very simple tool that generates multiple spellings of a phone number (to effectively search for it using the OR operator and quotes)☆21Dec 30, 2021Updated 4 years ago
- Reset your Linux password from external pen drive☆18Oct 3, 2020Updated 5 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- ☆17Dec 13, 2021Updated 4 years ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆11Oct 17, 2020Updated 5 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Makes files super hidden on NTFS☆19Aug 14, 2014Updated 11 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a firewall-evading backdoor, and reroutin…☆10Dec 23, 2014Updated 11 years ago
- ☆13Apr 16, 2016Updated 9 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week