Windows 10 De-Clutter script
☆25Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for windows-declutter
Users that are interested in windows-declutter are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Make your Windows 10 install a lot cleaner.☆18Mar 14, 2020Updated 6 years ago
- Wrapper and parser modules for Shopify's API.☆10Dec 26, 2022Updated 3 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆163Apr 19, 2020Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Ansible playbook for configuring the JMU CS VM provided by the UUG☆12Dec 12, 2025Updated 3 months ago
- This is a GAS application for rearranging Google Apps Scripts (GAS) in a project which can be seen at the script editor.☆16Apr 14, 2018Updated 7 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Presentation notes from JMU Unix Users Group meetings☆14Mar 7, 2026Updated 2 weeks ago
- A very simple lab to demo some Terraform, DSC, Inspec and Gitlab CI☆94Dec 8, 2022Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Aug 5, 2022Updated 3 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- A simple Python program to calculate delivery routes☆14Feb 26, 2025Updated last year
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 7 months ago