neohiro / ExploitProtectionLinks
Windows Exploit Protection Settings (Ultimate) GUI
☆74Updated 3 weeks ago
Alternatives and similar repositories for ExploitProtection
Users that are interested in ExploitProtection are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- ☆111Updated last year
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati …☆20Updated 2 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆92Updated 2 weeks ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month
- ASR Configurator, Essentials and Atomic Testing☆100Updated 9 months ago
- Another Hardening Windows Tool☆50Updated last year
- A collection of tools, scripts and personal research☆155Updated last month
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Updated 9 months ago
- A PowerShell variant of the amazing patch_review.py by kevthehermit☆177Updated 3 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆38Updated 9 months ago
- Some settings stolen from multiple scripts @ZephrFish☆132Updated last month
- Scripts and piece of codes used for Active Directory configuration☆83Updated 2 years ago
- AppLocker Policy Generator☆25Updated 5 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- ☆110Updated 2 years ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 9 months ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Updated last year
- Analyse MSI files for vulnerabilities☆141Updated last year
- Powershell script to help Speed up Threat hunting incident response processes☆43Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- ☆44Updated last year
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Updated 10 months ago
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year