ohjeongwook / WindowsEventTools
Collection Of Scripts And Utilities For Windows Event Hunting
☆18Updated 5 years ago
Alternatives and similar repositories for WindowsEventTools:
Users that are interested in WindowsEventTools are comparing it to the libraries listed below
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆11Updated 8 years ago
- ☆16Updated 6 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Lets you write arbitrary registry entries to Group Policy related .pol files (e.g. registry.pol)☆11Updated 5 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆15Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- EventList - the Baseline Event Analyzer☆11Updated 5 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆12Updated 3 years ago
- ☆20Updated 4 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ☆30Updated 6 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago
- ☆14Updated last month
- ☆9Updated 8 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago