Sysmon Tools for PowerShell
☆12Aug 17, 2018Updated 7 years ago
Alternatives and similar repositories for PSSysmonTools
Users that are interested in PSSysmonTools are comparing it to the libraries listed below
Sorting:
- string encryption in Nim☆20Jun 15, 2024Updated last year
- A PowerShell module with a variety of timer and countdown functions.☆26Aug 21, 2025Updated 6 months ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last week
- ☆31Dec 5, 2024Updated last year
- ☆12May 28, 2024Updated last year
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Some cacti Templates I use and some that I have created☆11Jun 27, 2023Updated 2 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆35Jan 15, 2026Updated last month
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Facial Recognition and Steganography☆10Oct 26, 2019Updated 6 years ago
- A workshop for developing with the Azure SQL Database and Azure Services☆13Updated this week
- ☆14Jun 4, 2025Updated 8 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A ton of helpful tools☆39Oct 8, 2021Updated 4 years ago
- ☆11Mar 22, 2016Updated 9 years ago
- Tips & Tricks to improve efficiency☆11Nov 3, 2020Updated 5 years ago
- A comprehensive set of calendar table value functions, for use in calendar dimensions or other applications.☆13Sep 10, 2020Updated 5 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Mega/Xmega soft core RTL design.☆11Feb 21, 2020Updated 6 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- back-to-work is a failover cluster manager written in POSIX shell scripting language☆10Aug 16, 2016Updated 9 years ago
- A tree component for Angular 2, without jQuery as dependency.☆11Sep 14, 2016Updated 9 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated last week
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 7 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Building My Dream Computer☆10Dec 2, 2022Updated 3 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆52Mar 3, 2025Updated last year
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- fakeroute is a simple tool that simulates network topologies by intercepting traceroute-like probes towards a set of IP addresses. Topolo…☆13Oct 20, 2021Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Baseline, check and correct your SQL Database Security☆12Mar 9, 2022Updated 3 years ago
- demo material for my Advanced DSC Workshop☆13Nov 20, 2017Updated 8 years ago
- 70-761 Companion☆12Mar 20, 2018Updated 7 years ago