Windows 10 De-Clutter script
☆25Jul 5, 2020Updated 5 years ago
Alternatives and similar repositories for windows-declutter
Users that are interested in windows-declutter are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Tools for Quickly Formatting and Partitioning USB Flash Drives☆11Apr 13, 2016Updated 9 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Follow all members of a list☆12Dec 20, 2021Updated 4 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Python implementation of netstat features☆14Jul 24, 2018Updated 7 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Apr 19, 2020Updated 5 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- quotes i like.☆17Aug 1, 2019Updated 6 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Nov 12, 2018Updated 7 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Apr 21, 2021Updated 4 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆20Feb 20, 2020Updated 6 years ago