Because I can't find scripts to do this anywhere else...
☆26Dec 27, 2016Updated 9 years ago
Alternatives and similar repositories for windows-hardening
Users that are interested in windows-hardening are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- YAML data sources for metasploit.github.io☆20Apr 12, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Scripts for securing Windows, Debian, and Ubuntu machines.☆22Aug 22, 2018Updated 7 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A distributed data flow and computation system that runs on transactional messaging infrastructure☆11Oct 22, 2022Updated 3 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ☆31Feb 24, 2014Updated 12 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Bots for our fun lil IRC chatroom☆15Oct 25, 2023Updated 2 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆30Sep 5, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- ☆20Dec 4, 2025Updated 3 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆10Aug 9, 2018Updated 7 years ago
- rtsp for humans☆12Nov 25, 2014Updated 11 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Create a stream from one or more memory regions.☆12Jan 22, 2024Updated 2 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Ansible galaxy role for Duo☆14Nov 30, 2015Updated 10 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ez_setup.py and distribute_setup.py☆19Sep 23, 2020Updated 5 years ago
- Monitors a Twitter stream and saves off any tweet that is deleted.☆27Sep 3, 2014Updated 11 years ago
- ☆15Jan 10, 2019Updated 7 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 4 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago