n0rthl1ght / ahwtLinks
Another Hardening Windows Tool
☆51Updated last year
Alternatives and similar repositories for ahwt
Users that are interested in ahwt are comparing it to the libraries listed below
Sorting:
- ☆57Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Windows Exploit Protection Settings (Ultimate) GUI☆72Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Analyse MSI files for vulnerabilities☆137Updated 11 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Monitor changes in Active Directory with replication metadata☆90Updated last year
- PowerShell Script Analyzer☆70Updated last year
- Cisco IOS Security Inspector☆34Updated 4 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 3 months ago
- A Repository to Track Anti-Forensic Techniques☆110Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Search for c2 servers based on netlas☆39Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆54Updated 7 months ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆77Updated 3 months ago
- Fetching passwords from the chrome browser database☆91Updated last year
- ☆30Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- GitHub CVE Repository Hunt☆18Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated last month
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- ☆41Updated last month
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆64Updated last month