☆14Aug 28, 2016Updated 9 years ago
Alternatives and similar repositories for PowerShell
Users that are interested in PowerShell are comparing it to the libraries listed below
Sorting:
- ☆55Mar 2, 2022Updated 3 years ago
- DevAV Roadshow Sample☆13Oct 15, 2014Updated 11 years ago
- This repository contains code and diagram for wifi tank using esp32 and smartphone☆11Apr 22, 2022Updated 3 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago
- Splunk scripted input for opening a backconnect shell on a remote forwarder☆45Nov 18, 2020Updated 5 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Cyences App (Cyber Defense) built by CrossRealms International - https://splunkbase.splunk.com/app/5351/☆11Feb 19, 2026Updated last week
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Confluent s2s Demo☆11Apr 28, 2023Updated 2 years ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆36Sep 28, 2015Updated 10 years ago
- Small hacks☆10Aug 9, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- Links to resources for ML(M)s.☆10Jan 26, 2020Updated 6 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- A tool to sign or resign an existing .NET assembly and update all the references to it.☆15Oct 21, 2015Updated 10 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Build your own Cognitive Search Library in Azure for all your valuable treasures.☆11Aug 3, 2017Updated 8 years ago
- Splunk Technology Add-On for pfsense☆11Mar 30, 2022Updated 3 years ago
- Marlin Simulator UI☆15Feb 19, 2026Updated last week
- Source code repository for Digital History Hacks☆23Jun 16, 2013Updated 12 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- A Basic Java Application Vulnerable to the Log4Shell RCE☆42Aug 1, 2023Updated 2 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- Splunk Cloud various automation stuffs☆11Jun 26, 2025Updated 8 months ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago