n0rthl1ght / ahwtLinks
Another Hardening Windows Tool
☆51Updated last year
Alternatives and similar repositories for ahwt
Users that are interested in ahwt are comparing it to the libraries listed below
Sorting:
- ☆56Updated 2 years ago
- Windows Exploit Protection Settings (Ultimate) GUI☆71Updated 4 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated 8 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- hiding in plain sight: part 2☆45Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- Analyse MSI files for vulnerabilities☆138Updated last year
- PowerShell Script Analyzer☆70Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 5 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆100Updated 3 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- ☆109Updated last year
- MS Graph Commands and Tools for Blue Teamers☆51Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- ☆13Updated last year
- Check IP addresses against known cloud provider IP address ranges☆46Updated 2 years ago
- Fetching passwords from the chrome browser database☆93Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated last year
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Cisco IOS Security Inspector☆37Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆79Updated 7 months ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆53Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year