n0rthl1ght / ahwtLinks
Another Hardening Windows Tool
☆51Updated last year
Alternatives and similar repositories for ahwt
Users that are interested in ahwt are comparing it to the libraries listed below
Sorting:
- ☆56Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 6 months ago
- PowerShell Script Analyzer☆70Updated 2 years ago
- Windows Exploit Protection Settings (Ultimate) GUI☆72Updated last week
- Monitor changes in Active Directory with replication metadata☆90Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 2 weeks ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- ☆109Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- Detection rule validation☆40Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆43Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 8 months ago
- A Repository to Track Anti-Forensic Techniques☆118Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated last month
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- ☆163Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Updated 2 years ago