neohiro / ExploitProtectionLinks
Windows Exploit Protection Settings (Ultimate) GUI
☆72Updated last week
Alternatives and similar repositories for ExploitProtection
Users that are interested in ExploitProtection are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆88Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- ☆110Updated last year
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆36Updated 8 months ago
- A collection of tools, scripts and personal research☆146Updated 4 months ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆31Updated 2 years ago
- Another Hardening Windows Tool☆51Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Analyse MSI files for vulnerabilities☆139Updated last year
- ASR Configurator, Essentials and Atomic Testing☆99Updated 7 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 7 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- Scripts and piece of codes used for Active Directory configuration☆82Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Some settings stolen from multiple scripts @ZephrFish☆131Updated 7 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated 3 weeks ago
- Create and enumerate hidden desktops.☆88Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Updated 3 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆78Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆37Updated last year
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated last year