msuiche / dinfo
Offline Active Directory Domain Services (AD DS) Join
☆11Updated 8 years ago
Alternatives and similar repositories for dinfo:
Users that are interested in dinfo are comparing it to the libraries listed below
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- ☆47Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆17Updated 4 years ago
- Carve files for MFT entries (eg. blkls output or memory dumps). Recovers filenames (long & short), timestamps ($STD & $FN) and data if re…☆21Updated 5 years ago
- Crack your macros like the math pros.☆33Updated 7 years ago
- ☆35Updated 6 years ago
- See here:☆42Updated 12 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Breaking the security of Microsoft's RMS☆53Updated 5 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- ☆12Updated 3 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- ☆14Updated 9 months ago
- Random PowerShell Scripts☆16Updated 3 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- ☆13Updated 8 years ago
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 5 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 5 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- ☆15Updated 6 years ago
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆22Updated 4 years ago
- Powershell script to find writable files on a system☆12Updated 7 years ago