neohiro / ExploitProtectionLinks
Windows Exploit Protection Settings (Ultimate) GUI
☆68Updated last month
Alternatives and similar repositories for ExploitProtection
Users that are interested in ExploitProtection are comparing it to the libraries listed below
Sorting:
- ☆104Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆40Updated last year
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆19Updated last year
- ☆39Updated 5 months ago
- My Favorite Offensive Security Scripts☆71Updated last month
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- A collection of tools, scripts and personal research☆128Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆86Updated 8 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆20Updated 5 months ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆48Updated 8 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Create and enumerate hidden desktops.☆90Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆74Updated last month
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated 8 months ago
- ☆54Updated 5 months ago
- XSerum is a powerful web attack payload generator designed for red teamers, ethical hackers, and researchers. It supports a wide range of…☆18Updated last month
- ☆62Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 3 months ago
- Analyse MSI files for vulnerabilities☆131Updated 9 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 4 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- ☆103Updated 8 months ago
- ☆77Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆77Updated 8 months ago