n0rthl1ght / ahwtLinks
Another Hardening Windows Tool
☆51Updated last year
Alternatives and similar repositories for ahwt
Users that are interested in ahwt are comparing it to the libraries listed below
Sorting:
- ☆57Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Windows Exploit Protection Settings (Ultimate) GUI☆73Updated 2 months ago
- PowerShell Script Analyzer☆70Updated last year
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Cisco IOS Security Inspector☆34Updated last month
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆44Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆19Updated 3 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Updated 2 years ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 3 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 4 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Check IP addresses against known cloud provider IP address ranges☆45Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- ☆54Updated 9 months ago