mubix / windows-declutterLinks
Windows 10 De-Clutter script
☆24Updated 4 years ago
Alternatives and similar repositories for windows-declutter
Users that are interested in windows-declutter are comparing it to the libraries listed below
Sorting:
- Password spraying on sites that require 2+ page loads and dynamic nonces☆31Updated 6 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- generates weak passwords based on current date☆42Updated last year
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- ☆36Updated 5 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 8 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 2 months ago
- Modern problems require modern solutions☆31Updated 2 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Updated 7 years ago
- Library of traffic redirectors☆26Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 7 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 4 years ago
- Network Finger Printer☆16Updated 7 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- automatic scan for hackthebox☆13Updated 5 years ago