Windows 10 De-Clutter script
☆25Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for windows-declutter
Users that are interested in windows-declutter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated last month
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 6 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- ☆37Apr 30, 2020Updated 6 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- ☆11Aug 13, 2021Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 3 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆163Apr 19, 2020Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 8 months ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 7 years ago
- Standardizing Security Titles☆25Apr 19, 2026Updated last month
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 6 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 9 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Aug 5, 2022Updated 3 years ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆94Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Reports on Driver, LSASS and other security services mitigations☆35Aug 18, 2025Updated 9 months ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆12May 6, 2026Updated 2 weeks ago
- A React Hook to use Google Drive spreadsheets as a database☆45Jan 20, 2020Updated 6 years ago
- ☆36Oct 5, 2016Updated 9 years ago