neohiro / ExploitProtectionLinks
Windows Exploit Protection Settings (Ultimate) GUI
☆73Updated 2 months ago
Alternatives and similar repositories for ExploitProtection
Users that are interested in ExploitProtection are comparing it to the libraries listed below
Sorting:
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- ☆106Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆87Updated last year
- Some settings stolen from multiple scripts @ZephrFish☆130Updated 4 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated 11 months ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆19Updated last year
- My Favorite Offensive Security Scripts☆77Updated 4 months ago
- Monitor changes in Active Directory with replication metadata☆91Updated last year
- Another Hardening Windows Tool☆51Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- A collection of tools, scripts and personal research☆146Updated last month
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆32Updated 2 years ago
- ASR Configurator, Essentials and Atomic Testing☆91Updated 5 months ago
- ☆109Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆78Updated last year
- Create and enumerate hidden desktops.☆90Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 11 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 8 months ago