n0rthl1ght / ahwt
Another Hardening Windows Tool
☆51Updated 6 months ago
Alternatives and similar repositories for ahwt:
Users that are interested in ahwt are comparing it to the libraries listed below
- VLAN ID Parser☆6Updated 9 months ago
- ☆56Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆38Updated last year
- Windows Exploit Protection Settings (Ultimate)☆59Updated last week
- Monitor changes in Active Directory with replication metadata☆86Updated 7 months ago
- GitHub CVE Repository Hunt☆18Updated 6 months ago
- ☆17Updated 3 months ago
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 7 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆38Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 9 months ago
- Analyse MSI files for vulnerabilities☆124Updated 5 months ago
- Useful collection of scapy-scripts and more☆26Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆68Updated last month
- ☆105Updated 3 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Updated 4 months ago
- ☆34Updated last month
- exfiltration/infiltration toolkit☆44Updated 3 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 10 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- hiding in plain sight: part 2☆44Updated 7 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆107Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 3 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year