n0rthl1ght / ahwt
Another Hardening Windows Tool
☆51Updated 7 months ago
Alternatives and similar repositories for ahwt:
Users that are interested in ahwt are comparing it to the libraries listed below
- ☆58Updated last year
- Cisco IOS Security Inspector☆17Updated last week
- Monitor changes in Active Directory with replication metadata☆88Updated 8 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 11 months ago
- Keygen for Positive Technologies Network Attack Detector☆22Updated last year
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated 2 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- hiding in plain sight: part 2☆44Updated 8 months ago
- ☆17Updated last week
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Quick OSINT checks for IPs and Domains during triage and investigations.☆28Updated 9 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated 2 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- Capture screenshots of onion services on an onion service.☆48Updated 9 months ago
- exfiltration/infiltration toolkit☆44Updated 4 months ago
- PowerShell Script Analyzer☆68Updated last year
- Repo for all my exploits/PoCs☆50Updated last month
- Windows Exploit Protection Settings (Ultimate)☆63Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆27Updated last month
- ☆51Updated 3 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 9 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 9 months ago
- ☆38Updated 3 months ago