neohiro / ExploitProtectionLinks
Windows Exploit Protection Settings (Ultimate) GUI
☆72Updated 2 weeks ago
Alternatives and similar repositories for ExploitProtection
Users that are interested in ExploitProtection are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆86Updated 9 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- ☆105Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- My Favorite Offensive Security Scripts☆74Updated 2 months ago
- ASR Configurator, Essentials and Atomic Testing☆69Updated 3 months ago
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- A collection of tools, scripts and personal research☆138Updated 2 weeks ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆32Updated 2 years ago
- ☆40Updated last year
- Analyse MSI files for vulnerabilities☆137Updated 10 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated 9 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆115Updated last month
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆108Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆19Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- ☆77Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Updated 9 months ago
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- A powershell module for hiding payloads in the pixels of images☆61Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆43Updated last year
- Tool for enumerating Active Directory environments☆47Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆125Updated last year