neohiro / ExploitProtectionLinks
Windows Exploit Protection Settings (Ultimate) GUI
☆72Updated last month
Alternatives and similar repositories for ExploitProtection
Users that are interested in ExploitProtection are comparing it to the libraries listed below
Sorting:
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆86Updated 10 months ago
- ☆106Updated last year
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆77Updated 3 months ago
- ASR Configurator, Essentials and Atomic Testing☆84Updated 3 months ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆19Updated last year
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated 10 months ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆32Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- A collection of tools, scripts and personal research☆144Updated last month
- ☆108Updated 2 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆32Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆122Updated 2 years ago
- ☆77Updated last year
- Capture screenshots of onion services on an onion service.☆70Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- Another Hardening Windows Tool☆51Updated last year
- Some settings stolen from multiple scripts @ZephrFish☆127Updated 3 months ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 4 months ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- My Favorite Offensive Security Scripts☆75Updated 3 months ago
- Detection rule validation☆41Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated 10 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆17Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated last year
- Monitor changes in Active Directory with replication metadata☆90Updated last year